Reverse Shells

PowerShell Reverse Shell


Python Reverse Shell

PHP Reverse Shell

Perl Reverse Shell


Bash Reverse Shell

Netcat Reverse Shell

without -e :

Ncat bind encrypted shell

On Victim:

On attacker:

Netcat Bind Shell – Allowed host

Attacker:

Netcat Reverse Shell

Attacker:

Socat Reverse Shell

Set listener:

Connect to attacker’s machine:

Eks 2.:

On Attacker:

On Target:

Socat Bind Shell

Set listener:

Connect to the listener:

Sbd (netcat clone)

Set listener:

Connect to listener:

SharpCat

Bypass Applocker

SharpCat – A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)
https://github.com/Cn33liz/SharpCat

Change SharpCat.cs (change this line) changing IP to connect back to and port before compiling.

Compiling:

Run SharpCat:

Bypass Applocker and run reverse connect to netcat listener:

nc -lnvp 1233

Mcreator

Encoded Reverse Shell Creator to bypass AVs

Python Script

test.py

Reverse Shell – Cheatsheet
Tagged on: