https://github.com/nchgroup/shellgen
shellgen is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste
https://github.com/nchgroup/shellgen
backdoor bind-shell linux php reverse-shell windows
Last synced: 5 months ago
JSON representation
shellgen is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste
- Host: GitHub
- URL: https://github.com/nchgroup/shellgen
- Owner: nchgroup
- License: mit
- Created: 2023-08-05T01:12:33.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-03-09T18:42:47.000Z (almost 2 years ago)
- Last Synced: 2025-08-02T12:38:28.589Z (6 months ago)
- Topics: backdoor, bind-shell, linux, php, reverse-shell, windows
- Language: Python
- Homepage:
- Size: 34.2 KB
- Stars: 5
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# shellgen
**shellgen** is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste
# Supported
* Linux
* reverse
* bind
* Windows
* reverse
* download execute
* PHP Web Shell
# Usage
### Help
```
$ python3 shellgen.py -h
usage: shellgen.py [-h] {linux_rev,linux_bind,windows_rev,download_exec,php_shell} ...
options:
-h, --help show this help message and exit
subcommands:
{linux_rev,linux_bind,windows_rev,download_exec,php_shell}
linux_rev Linux reverse shells
linux_bind Linux bind shells
windows_rev Windows reverse shells
download_exec Windows shellcode generator for download and execute
php_shell PHP shells
Subcommand 'linux_rev':
usage: shellgen.py linux_rev [-h] [-s SHELLTYPE] -ip IPDST [-p PORTDST] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]
options:
-h, --help show this help message and exit
-s SHELLTYPE, --shell SHELLTYPE
Type of shell
-ip IPDST, --ip IPDST
IP destination
-p PORTDST, --port PORTDST
Port destination
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape
Subcommand 'linux_bind':
usage: shellgen.py linux_bind [-h] [-s SHELLTYPE] [-p PORTSRC] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]
options:
-h, --help show this help message and exit
-s SHELLTYPE, --shell SHELLTYPE
Type of shell
-p PORTSRC, --port PORTSRC
Port source
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape
Subcommand 'windows_rev':
usage: shellgen.py windows_rev [-h] -ip IPDST [-p PORTDST] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]
options:
-h, --help show this help message and exit
-ip IPDST, --ip IPDST
IP destination
-p PORTDST, --port PORTDST
Port destination
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape
Subcommand 'download_exec':
usage: shellgen.py download_exec [-h] -u URL [-f {msf,hex,b64}] [-r]
options:
-h, --help show this help message and exit
-u URL, --url URL Url dropper
-f {msf,hex,b64}, --format {msf,hex,b64}
Type of format => msf: metasploit, hex: hexadecimal, b64: base64
-r, --raw Raw payload
Subcommand 'php_shell':
usage: shellgen.py php_shell [-h] [-m {request,get,post,REQUEST,GET,POST}] [-p PARAMETER] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]
options:
-h, --help show this help message and exit
-m {request,get,post,REQUEST,GET,POST}, --method {request,get,post,REQUEST,GET,POST}
Type of method
-p PARAMETER, --parameter PARAMETER
Parameter ex: ?=whoami
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape
```
# References
* https://github.com/trustedsec/unicorn
# Colaborators
* Vay3t
* https://github.com/elborikua