Home / Security Testing / Offensive Security / Reverse Shell Cheat Sheet
Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

What is Reverse Shell Cheat Sheet

A framework for testing and exploiting race conditions in software

If You're Fortunate Enough to...

If you're fortunate enough to discover a command execution vulnerability during a penetration test, you will likely want an interactive shell shortly thereafter. If adding a new account, SSH key, or .rhosts file to log in isn't feasible, your next move will probably involve either initiating a reverse shell or binding a shell to a TCP port.

This page addresses the previous topic

Your options for creating a reverse shell are constrained by the scripting languages that are installed on the target system. However, if you are adequately prepared, you could also upload a binary program.

Examples for Unix-like Systems and Windows Compatibility

The examples provided are specifically designed for Unix-like systems. However, some of the examples below can also function on Windows if you replace "/bin/sh -i" with "cmd.exe". Each method listed is intended to be a one-liner that you can easily copy and paste. While these lines are concise, they may sacrifice some readability.
 

Reverse Shell Cheat Sheet Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with Reverse Shell Cheat Sheet tool and help others make informed decisions.

Metasploit
Free

Metasploit View Metasploit

Metasploit is the industry-leading open-source penetration testing platform, empowering security professionals to discover, exploit, and validate vulnerabilities with precision and efficiency. Its comprehensive framework provides a robust environment for developing and executing exploit code, managing security assessments, and enhancing defensive strategies through IDS signature development and anti-forensic techniques. Trusted globally, Metasploit accelerates your security testing lifecycle and strengthens your organization's defenses against emerging threats.

Extensive exploit module library
Vulnerability scanning and validation
Payload generation and management
E
Free

EasyHunting View EasyHunting

A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, integrating diverse tools, and delivering AI-powered insights.

YARI
Free

YARI

A cheat sheet providing examples of creating reverse shells for penetration testing.

Yara4Pentesters
Free

Yara4Pentesters

A front-end JavaScript toolkit for creating DNS rebinding attacks

WS-Attacker
Free

WS-Attacker

A cheat sheet providing examples of creating reverse shells for penetration testing.

XAHICO Platform
Free

XAHICO Platform

A customized Kali Linux distribution for ICS/SCADA pentesting professionals