🌐
pentestmonkey
pentestmonkey.net › cheat-sheet › shells › reverse-shell-cheat-sheet
Reverse Shell Cheat Sheet | pentestmonkey
One of the simplest forms of reverse shell is an xterm session. The following command should be run on the server.
🌐
RevShells
revshells.com
Online - Reverse Shell Generator
Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode. Great for CTFs.
People also ask

What is the difference between a reverse shell and a bind shell?
A bind shell listens for inbound connections on the compromised system, while a reverse shell initiates an outbound connection to the attacker. Reverse shells are more common because they can bypass firewalls, NAT, and container network boundaries more easily.
🌐
invicti.com
invicti.com › learn › reverse-shell
Reverse Shell
What is the difference between a web shell and a reverse shell?
A web shell is a script embedded in a web application that lets attackers run commands by sending HTTP requests to it. A reverse shell establishes an outbound network connection from the compromised system to the attacker and provides an interactive operating system shell. Web shells operate at the application layer, while reverse shells can provide deeper system-level access and are commonly used post-exploitation.
🌐
invicti.com
invicti.com › learn › reverse-shell
Reverse Shell
Are reverse shells illegal?
Reverse shells are merely a technique for remote system access and are not inherently illegal. They are commonly used in penetration testing and security research with authorization. However, installing and using them without permission to access systems is illegal.
🌐
invicti.com
invicti.com › learn › reverse-shell
Reverse Shell
🌐
GitHub
github.com › medpaf › reverse-shell
GitHub - medpaf/reverse-shell: Simple reverse shell written in Python. · GitHub
Simple reverse shell written in Python. Contribute to medpaf/reverse-shell development by creating an account on GitHub.
Author   medpaf
🌐
Imperva
imperva.com › home › appsec › reverse shell
What Is a Reverse Shell | Examples & Prevention Techniques | Imperva
December 20, 2023 - In a standard remote shell attack, attackers connect a machine they control to the target’s remote network host, requesting a shell session. This tactic is known as a bind shell. Attackers can use a reverse shell if a remote host is not publicly accessible (i.e., due to firewall protection or a non-public IP).
🌐
Invicti
invicti.com › learn › reverse-shell
Reverse Shell
These are commonly referred to as remote shells and can be used for legitimate administration tasks, but also potentially abused by attackers. In a traditional remote access scenario, the user’s machine acts as a client and the target machine listens as a server. The user initiates the connection, for example by connecting to an SSH service. A reverse shell inverts this model.
🌐
GitHub
github.com › nicholasaleks › reverse-shells
GitHub - nicholasaleks/reverse-shells: A collection of reverse shell commands and payloads · GitHub
or use socat binary to get a fully tty reverse shell · socat file:`tty`,raw,echo=0 tcp-listen:12345 · Spawn a TTY shell from an interpreter · /bin/sh -i python3 -c 'import pty; pty.spawn("/bin/sh")' python3 -c "__import__('pty').spawn('/bin/bash')" python3 -c "__import__('subprocess').call(['/bin/bash'])" perl -e 'exec "/bin/sh";' perl: exec "/bin/sh"; perl -e 'print `/bin/bash`' ruby: exec "/bin/sh" lua: os.execute('/bin/sh') vi: :!bash ·
Starred by 50 users
Forked by 11 users
🌐
GitHub
github.com › trackmastersteve › shell
GitHub - trackmastersteve/shell: Python 3 Reverse Shell · GitHub
You can take advantage of post exploitation modules in Metasploit by using: exploit/multi/handler set PAYLOAD linux/shell_reverse_tcp windows/shell_reverse_tcp etc.
Starred by 26 users
Forked by 15 users
Languages   Python
Find elsewhere
🌐
Medium
medium.com › @kiptryin › reverse-shells-101-gaining-shell-access-with-python-and-bash-61faf539a822
Reverse Shells 101: Gaining Shell Access with Python and Bash | by Kiptryin | Medium
July 28, 2025 - After the command runs on the target machine, a reverse shell will appear in your Netcat listener. You can the command python3 -c ‘import pty; pty.spawn(“/bin/bash”)’ to upgrade a basic reverse shell (like one received via a Python payload) to a fully interactive Bash shell as shown below.
🌐
High on Coffee
highon.coffee › blog › reverse-shell-cheat-sheet
Reverse Shell Cheat Sheet: PHP, ASP, Netcat, Bash & Python
February 27, 2022 - Reverse Shell Cheat Sheet (Updated: 2024), a list of reverse shells for connecting back on Linux/Windows with PHP, Python, Powershell, nc (Netcat), JSP, Java, Bash, PS etc.
🌐
The Python Code
thepythoncode.com › article › create-reverse-shell-python
How to Create a Reverse Shell in Python - The Python Code
Building a reverse shell in Python using sockets that can execute remote shell commands and send the results back to the server.
🌐
Tex2e
tex2e.github.io › reverse-shell-generator › index.html
Reverse Shells Generator
🔍 OSINT · 👁 Recon · 🕷 Web · 💉 SQL · 🐚 RevShell · ⬆ Upload · 🔑 Password · 🔪 PrivEsc · RHOST
🌐
Reddit
reddit.com › r/python › phantom - a multi-platform http(s) reverse shell server and client in python 3
r/Python on Reddit: Phantom - A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
November 26, 2021 -

Phantom is a multi-platform HTTP(S) Reverse Shell server and client in Python 3. Binaries for Linux and Windows platforms can be built through an embedded script that executes PyInstaller.

Reverse shells can be established through HTTP or HTTPS. The certificates used for HTTPS can be auto-generated by Phantom or supplied by the user.

Phantom includes a helper shell script that enables fast generation of self-signed certificates for use of both servers and clients. After generation, the server and certificate authority certificates required for encrypted connections are bundled in the binaries for portability and ease of execution.

Check it out on GitHub at https://github.com/EONRaider/BCA-Phantom

🌐
Faun
faun.pub › making-a-reverse-shell-in-python-52ba50a523d9
Making a Reverse Shell In Python
July 1, 2022 - Making a Reverse Shell In Python There are many ways to gain control over a compromised system. A common practice is to gain interactive shell access, which enables you to try to gain complete …
🌐
Payloads All The Things
swisskyrepo.github.io › PayloadsAllTheThings › Methodology and Resources › Reverse Shell Cheatsheet
Reverse Shell Cheat Sheet - Payloads All The Things
Meterpreter Shell · Windows Staged reverse TCP · Windows Stageless reverse TCP · Linux Staged reverse TCP · Linux Stageless reverse TCP · Other platforms · Spawn TTY Shell · References · March 24, 2025 · Share this content ·
🌐
GitHub
github.com › orestisfoufris › Reverse-Shell---Python › blob › master › reverseshell.py
Reverse-Shell---Python/reverseshell.py at master · orestisfoufris/Reverse-Shell---Python
A simple reverse shell written in python. Contribute to orestisfoufris/Reverse-Shell---Python development by creating an account on GitHub.
Author   orestisfoufris
🌐
Asafety
asafety.fr › reverse-shell-one-liner-cheat-sheet
ASafety » Reverse-shell one-liner Cheat Sheet
La plupart des commandes suivantes sont plus ou moins difficiles à la lecture. L’objectif est d’avoir des commandes uniques à exécuter sur la machine à contrôler pour obtenir le reverse-shell, avec redirection de l’entrée standard, sortie standard et sortie d’erreur.
🌐
Ironhackers
ironhackers.es › es › herramientas › reverse-shell-cheat-sheet
Reverse shell - Cheat Sheet
May 14, 2018 - Power belongs to the people who take it · Sorry, this entry is only available in European Spanish. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language