{"id":24630984,"url":"https://github.com/nchgroup/shellgen","last_synced_at":"2025-08-24T22:13:17.290Z","repository":{"id":186228130,"uuid":"674854176","full_name":"nchgroup/shellgen","owner":"nchgroup","description":"shellgen is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste","archived":false,"fork":false,"pushed_at":"2024-03-09T18:42:47.000Z","size":35,"stargazers_count":5,"open_issues_count":0,"forks_count":1,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-08-02T12:38:28.589Z","etag":null,"topics":["backdoor","bind-shell","linux","php","reverse-shell","windows"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/nchgroup.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-08-05T01:12:33.000Z","updated_at":"2025-07-08T12:30:30.000Z","dependencies_parsed_at":"2024-03-09T19:43:26.050Z","dependency_job_id":null,"html_url":"https://github.com/nchgroup/shellgen","commit_stats":null,"previous_names":["nchgroup/shellgen"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/nchgroup/shellgen","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshellgen","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshellgen/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshellgen/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshellgen/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/nchgroup","download_url":"https://codeload.github.com/nchgroup/shellgen/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshellgen/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":271962096,"owners_count":24850593,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-08-24T02:00:11.135Z","response_time":111,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["backdoor","bind-shell","linux","php","reverse-shell","windows"],"created_at":"2025-01-25T07:14:04.128Z","updated_at":"2025-08-24T22:13:17.268Z","avatar_url":"https://github.com/nchgroup.png","language":"Python","funding_links":[],"categories":[],"sub_categories":[],"readme":"# shellgen\n**shellgen** is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste\n\n# Supported\n* Linux\n    * reverse\n    * bind\n* Windows\n    * reverse\n    * download execute\n* PHP Web Shell\n\n# Usage\n\n### Help\n\n```\n$ python3 shellgen.py -h\nusage: shellgen.py [-h] {linux_rev,linux_bind,windows_rev,download_exec,php_shell} ...\n\noptions:\n  -h, --help            show this help message and exit\n\nsubcommands:\n  {linux_rev,linux_bind,windows_rev,download_exec,php_shell}\n    linux_rev           Linux reverse shells\n    linux_bind          Linux bind shells\n    windows_rev         Windows reverse shells\n    download_exec       Windows shellcode generator for download and execute\n    php_shell           PHP shells\n\n\nSubcommand 'linux_rev':\nusage: shellgen.py linux_rev [-h] [-s SHELLTYPE] -ip IPDST [-p PORTDST] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]\n\noptions:\n  -h, --help            show this help message and exit\n  -s SHELLTYPE, --shell SHELLTYPE\n                        Type of shell\n  -ip IPDST, --ip IPDST\n                        IP destination\n  -p PORTDST, --port PORTDST\n                        Port destination\n  -r, --raw             Raw payload\n  -e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}\n                        Type of encoding =\u003e b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:\n                        json_escape\n\n\nSubcommand 'linux_bind':\nusage: shellgen.py linux_bind [-h] [-s SHELLTYPE] [-p PORTSRC] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]\n\noptions:\n  -h, --help            show this help message and exit\n  -s SHELLTYPE, --shell SHELLTYPE\n                        Type of shell\n  -p PORTSRC, --port PORTSRC\n                        Port source\n  -r, --raw             Raw payload\n  -e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}\n                        Type of encoding =\u003e b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:\n                        json_escape\n\n\nSubcommand 'windows_rev':\nusage: shellgen.py windows_rev [-h] -ip IPDST [-p PORTDST] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]\n\noptions:\n  -h, --help            show this help message and exit\n  -ip IPDST, --ip IPDST\n                        IP destination\n  -p PORTDST, --port PORTDST\n                        Port destination\n  -r, --raw             Raw payload\n  -e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}\n                        Type of encoding =\u003e b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:\n                        json_escape\n\n\nSubcommand 'download_exec':\nusage: shellgen.py download_exec [-h] -u URL [-f {msf,hex,b64}] [-r]\n\noptions:\n  -h, --help            show this help message and exit\n  -u URL, --url URL     Url dropper\n  -f {msf,hex,b64}, --format {msf,hex,b64}\n                        Type of format =\u003e msf: metasploit, hex: hexadecimal, b64: base64\n  -r, --raw             Raw payload\n\n\nSubcommand 'php_shell':\nusage: shellgen.py php_shell [-h] [-m {request,get,post,REQUEST,GET,POST}] [-p PARAMETER] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]\n\noptions:\n  -h, --help            show this help message and exit\n  -m {request,get,post,REQUEST,GET,POST}, --method {request,get,post,REQUEST,GET,POST}\n                        Type of method\n  -p PARAMETER, --parameter PARAMETER\n                        Parameter ex: ?\u003cparameter\u003e=whoami\n  -r, --raw             Raw payload\n  -e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}\n                        Type of encoding =\u003e b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:\n                        json_escape\n```\n\n# References\n* https://github.com/trustedsec/unicorn\n\n# Colaborators\n* Vay3t\n* https://github.com/elborikua\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnchgroup%2Fshellgen","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fnchgroup%2Fshellgen","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnchgroup%2Fshellgen/lists"}