πŸ™ˆ
Pentesting
search
⌘Ctrlk
πŸ™ˆ
Pentesting
  • Tenaka.net
  • Links
  • Recon
    • NMAP
  • Enumeration
    • NMAP
    • Windows
    • Linux
    • Kali
    • Certificates
    • FTP
    • Web
    • DNS
    • LDAP \ AD \ DC
    • Group Policy
    • SMB
    • Databases
    • Exploit-DB
    • WinRM
    • Files
    • Misc
    • Python
  • Exploitation
    • FTP
    • Meterpreter
    • MSVenom
    • Reverse Shells
      • Groovy Script Console
      • Web Reverse Shell using Powershell
      • Upload and exe from web or ftp site
      • nc
      • Bash Reverse Shell
      • MSFConsole Reverse Shell
    • Metasploit
    • Burpsuite
  • Boxes
  • Useful Commands
    • PowerSploit \ Empire
    • Transfer Data
    • Password Cracking
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Exploitation

Reverse Shells

Groovy Script Consolechevron-rightWeb Reverse Shell using Powershellchevron-rightUpload and exe from web or ftp sitechevron-rightncchevron-rightBash Reverse Shellchevron-rightMSFConsole Reverse Shellchevron-right
PreviousWindowschevron-leftNextGroovy Script Consolechevron-right

Last updated 3 years ago