Reverse Shell Generator by Ryan Montgomery
⚠️ BETA ⚠️
This project is in the beta phase, we will be constantly updating the main branch, if you have found any bugs or issues, please let us know via GitHub Issues and we will try our best to get it resolved quickly.
More: https://github.com/0dayCTF/reverse-shell-generator
Summary
This is an Online Reverse Shell Generator that allows anyone to configure their IP Addresses, Ports, and Shell of choice for your favorite reverse shell payloads, this generator has functionality to save all settings in local storage, so that you can return to the site at any time and not lose any of your settings. All interactions and shells generated, never interact with the server, so no logs are created. This can also be used in real-life Penetration Tests and/or CTFs. All the shells are compiled from publicly available, and well-known one-liners. The team is constantly updating, so make sure to Bookmark the website.
Host Locally
git clone https://github.com/0dayCTF/reverse-shell-generator
Features
- PHP
- Bash
- Netcat
- Pwncat
- ConPty
- SH
- Awk
- Ruby
- Python
- Powershell
- Powershell Encoded
- Emoji PHP (actually works)
- Mkfifo
- Socat
- js
Improvement plan
We are constantly working on adding new solutions for the best one-liners and listeners please feel free to suggest a new feature in our issues section https://github.com/0dayCTF/reverse-shell-generator/issues.
Coming soon
- Bind Shells
- MSFVenom Payload Generator
- cURL’able raw payloads
Credits
Thank you for the awesome, support, development, and ideas.
@weibell
About the Author
I am Ryan Montgomery “0day”. My social media is https://instagram.com/0day / https://twitter.com/0dayCTF / https://facebook.com/RyanMMontgomery
The post Reverse Shell Generator by Ryan Montgomery appeared first on Hakin9 – IT Security Magazine.
I’m the #1 hacker on the TryHackMe leaderboard https://tryhackme.com/leaderboards