Collections
Ready-to-use presets and your saved reverse shell configurations.
Ready-to-use reverse shells
17Load a preset into the builder, adapt LHOST/LPORT, and save your own copy.
Classic Bash reverse shell for Linux targets where Bash supports /dev/tcp.
Portable netcat fallback for builds without the -e option.
Python reverse shell suited for command injection and web RCE contexts.
PHP proc_open payload for environments where PHP execution is available.
Bash payload wrapped in base64 decode for filter-sensitive shells.
Bash payload with spaces replaced by '${IFS}' for simple space filters.
PowerShell TCPClient payload encoded as UTF-16LE base64 for -EncodedCommand.
Socat payload that starts closer to an interactive TTY from the first callback.
HTTP polling PowerShell callback for lab environments where raw TCP egress is blocked.
Fetch a prepared rs.sh second-stage script from your HTTP server.
Perl reverse shell for targets with Perl and outbound TCP access.
Ruby TCPSocket payload for targets where Ruby is available.
Bind shell preset for isolated labs where the operator connects inbound.
Python bind shell fallback when netcat -e is unavailable.
Node.js reverse shell for targets with server-side JavaScript execution.
TLS callback using openssl s_client and a named pipe.
Compact BusyBox netcat payload for minimal Linux environments.
Saved Collections
0Loading...