Skip to content

This repository is a collection of various reverse shell scripts in different languages. These scripts can be used by cyber security professionals to establish a remote connection to a target machine, allowing them to gain access and control over the system.

Notifications You must be signed in to change notification settings

0xshahriar/reverse-shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Reverse Shell

A reverse shell is a type of malicious software or payload that allows an attacker to remotely access and control a target computer by establishing a connection from the target computer to the attacker's computer. This connection is typically established using the Transmission Control Protocol (TCP) and a specific port, such as 4444, which the attacker will be listening on. Once the connection is established, the attacker can execute shell commands on the target computer, upload or download files, and perform other malicious activities.

The main difference between a reverse shell and a traditional shell is that in a traditional shell, the attacker connects to the target computer, whereas in a reverse shell, the target computer connects to the attacker. This can make reverse shells more difficult to detect and block, as they may appear to be legitimate outbound network traffic.

Reverse shell can be used for malicious activities such as stealing personal information, installing malware, and disrupting the normal operation of the target computer. It is important to note that using a reverse shell for any purpose other than authorized penetration testing or security research is illegal and can result in serious consequences. It is important to always obtain proper authorization and legal clearance before attempting to use this or any other hacking tool.

About

This repository is a collection of various reverse shell scripts in different languages. These scripts can be used by cyber security professionals to establish a remote connection to a target machine, allowing them to gain access and control over the system.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published