Exploit Pack - Documentation
  • Exploit Pack
    • Installation guide
    • License Activation
    • First steps
    • Running the network mapper
    • AutoPwn
    • UTF-8 Locator
    • Notepad
    • Reverse shell - One-liners
    • Hex Editor
    • GDB Connector
    • Log your actions
    • Exploits customization
    • Add a Proxy to Exploit Pack
    • Using Reverse Shells
    • XSS Agent - Tunnel
    • Advanced DLL Injections
    • VBS/PS Agent - Remote Access
    • VBS Agent Wizard
    • Exploit Development I
    • Exploit Development II
    • Exploit Development III
  • Control Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Control Pack
    • Launch your first agent
    • Control Pack agent's code
    • Agent connection
    • Java Agent
    • Browser Agent
    • VBS Agent
    • .NET Profiler DLL Agent
    • How to use the DLL + UnHooker Agent
    • .NET shell
    • Python Shell
  • Kernel Pack
Powered by GitBook
On this page

Was this helpful?

  1. Exploit Pack

Reverse shell - One-liners

We've got your back :-)

PreviousNotepadNextHex Editor

Last updated 1 year ago

Was this helpful?

While working on a pentest you might need to use a one-liner shell. Typically you will have a cheat sheet for one-liners but that will require you to Google it, and you also have to customize them! We've got your back here, Go to Tools -> Shell One-Liner

Here you can select the language for your shell. Then type the address of Exploit Pack where the shell is going to connect back. In this example, we are creating a simple PHP one-liner that could be run as a web shell. Ready to run it? You need a listener!

Click "Start listener" to bring up the wizard as shown in the screenshot. We are using the port 5678, that was configured as the same port to be used by the one-liner:

Good luck with your one-liners! And remember to scale it up to a full agent!