Welcome to this unique site that allows you to set up values for your reverse shell payloads in a cheat sheet format that can be used in real-life scenarios. Powered by Lucian Nitescu, based on publicly available knowledge.
|Why?||Because it helps me! As a pentester and security expert, I realized how many occasions I screwed up a payload.|
|Is this all yours?||No. Thanks to: highon.coffee; gtfobins.github.io; nitesculucian.github.io; ired.team!|
|Is this comprehensive?||No, and it does not aim for that. On this page, you will actually find payloads that helped me throughout my work and OSCP labs.|
|Can I add something?||Yes, just make a pull request.|
|Why the skeleton framework?||I wanted to give it a try and see if it is up to the task.|
|Contact?||Linkedin | Twitter | Facebook|