Nifty One Liners
PHP Reverse netcat
Reverse Bash
Where 443 is the port
Reverse Powershell (interactive powershell)
Reverse cmd using Powershell (powercat)
Download powercat.ps1 and start python3 -m http.server in the same directory (Kali IP 192.168.1.109). Next start a NC listener on port 4444 and run this command on the victim:
Download file at Victim using PowerShell
Here, 10.10.16.3 is Kali IP (attacker) and -outf specifies the directory where to store file.
Last updated