# Reverse shell - One-liners

While working on a pentest you might need to use a one-liner shell. Typically you will have a cheat sheet for one-liners but that will require you to Google it, and you also have to customize them! \
We've got your back here, **Go to Tools -> Shell One-Liner**

![](/files/-MUDNdcjBDR6bAhP7mON)

Here you can select the language for your shell. Then type the address of Exploit Pack where the shell is going to connect back. In this example, we are creating a simple PHP one-liner that could be run as a web shell. Ready to run it? You need a listener!

![](/files/-MUDNkyUihHix06FblgE)

Click "**Start listener**" to bring up the wizard as shown in the screenshot. We are using the port 5678, that was configured as the same port to be used by the one-liner:

![](/files/-MUDNq4C8qXnLtvs6HWE)

Good luck with your one-liners! And remember to scale it up to a full agent!


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://exploit-pack.gitbook.io/exploit-pack-manual-pages/master/reverse-shell-one-liners.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
