# Using Reverse Shells

This kind of shell can be created either by running an exploit and executing a shellcode that connects back to Exploit Pack or directly by making a binary/py and manually running it in the remote computer. ‌&#x20;

Do not confuse this reverse shell with the XSS/VBS/PS agents, they also provide a connection back to Exploit Pack but they are different because these reverse shells are meant to be used as a step-stone to escalate privileges and run local exploits to pivot to another part of the targeted network during your pentest. ‌&#x20;

The first option, more frequently used, will be to obtain this shell through an exploit ( adding it as a shellcode ) but if you want to create it manually select the "**Reverse shell**" icon on the **toolbar** and follow the **wizard**, select the platform of your choice and set up the values that you have on your workstation then click the "**Next**" button.

![](/files/-MdRfLqcNOBWkNT94mqv)

After this is done, you will see the code in **Python** format, if you need to have a binary we recommend you to use something like Py2Exe: <http://www.py2exe.org/​>

![](/files/-MdRffAIX7p4K57QHD91)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://exploit-pack.gitbook.io/exploit-pack-manual-pages/master/using-reverse-shells.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
