# Reverse shell - One-liners

While working on a pentest you might need to use a one-liner shell. Typically you will have a cheat sheet for one-liners but that will require you to Google it, and you also have to customize them! \
We've got your back here, **Go to Tools -> Shell One-Liner**

![](https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MU9W-baGw5TeUzNXoyo%2F-MUDMNWYfJfjQShCGnxf%2F-MUDNdcjBDR6bAhP7mON%2Fimage.png?alt=media\&token=7bcd7e08-66e4-4de3-bec8-bb78bf3a0ea4)

Here you can select the language for your shell. Then type the address of Exploit Pack where the shell is going to connect back. In this example, we are creating a simple PHP one-liner that could be run as a web shell. Ready to run it? You need a listener!

![](https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MU9W-baGw5TeUzNXoyo%2F-MUDMNWYfJfjQShCGnxf%2F-MUDNkyUihHix06FblgE%2Fimage.png?alt=media\&token=bddbad72-43bc-49c9-9434-1f1c09b543e3)

Click "**Start listener**" to bring up the wizard as shown in the screenshot. We are using the port 5678, that was configured as the same port to be used by the one-liner:

![](https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MU9W-baGw5TeUzNXoyo%2F-MUDMNWYfJfjQShCGnxf%2F-MUDNq4C8qXnLtvs6HWE%2Fimage.png?alt=media\&token=cab550a2-ad30-4229-9646-96b0873b10f2)

Good luck with your one-liners! And remember to scale it up to a full agent!
