β˜„οΈ
Certified Ethical Hacker
  • πŸ‘‰Certified Ethical Hacker Cheatsheet
  • 🐧General Settings
    • πŸ“¦APT Package Manager
    • πŸ€–Cron
    • 🦊Firefox Extensions
  • ✍️Research & Report
    • πŸ’ Obsidian
    • 🎒Notion
    • 🐼Pwndocs
  • πŸ”ŽInformation Gathering
    • πŸ“›NSLookup // Dig // Whois
    • πŸ“œNmap
    • πŸ–₯️DNS Enumeration
  • πŸ”¬Vulnerability Assessment
    • 🌐Web Assessment
      • Nikto
      • WPScan
    • πŸ•ΈοΈNetwork Assessment
      • OpenVAS
      • Nessus
  • βš”οΈExploitation
    • πŸ”΄Metasploit
    • 🐍MSFVenom
    • πŸ‘οΈSearchsploit
    • 🐚Revshells
    • 🐱Netcat
      • 😾Pwncat-CS
    • πŸ’ͺBrute Force
    • πŸ”’Wi-FI
  • ⚜️Post Exploitation
    • β›ΊPersistence
    • πŸ“File Transfer
      • Netcat
      • SMB
      • Python
      • Updog
      • Linpeas
    • πŸ•³οΈTunnelling
Powered by GitBook
On this page
  1. Exploitation

Revshells

PreviousSearchsploitNextNetcat

Last updated 1 year ago

Usage

βš”οΈ
🐚
Online - Reverse Shell Generator
Logo
Set your IP and Port
You can use this to quickly copy and paste a reverse shell command
Select the type of shell you want
Choose an OS and a shell
Generate and Copy