LAZYPARIAH: A CLI tool for quickly generating reverse shell payloads.

edited November 2020 in Tools

Hi everyone!

Something that I've found a little bit tedious at times when attacking machines is copying and pasting reverse shell payloads, changing the attacker IP address and port, and fiddling around with URL encoding, Base64 encoding, Gzip compression, etc.

There are some brilliant cheat sheets out there (like the highon.coffee Reverse Shell Cheat Sheet, for example), but to optimise things just that little bit further, I made a quick command-line tool (easily installable with gem install lazypariah).

Here's the link to the Github page if anyone wants to give it a crack:

https://github.com/octetsplicer/LAZYPARIAH

So far, it's got payloads for Python, Ruby, Perl, Bash, PHP, Netcat, Awk, Socat, Java and C. The Java and C payloads are compiled on the fly (and require OpenJDK and GCC respectively).

Happy hacking! :smile:

(2020/11/23: Edited to reflect changes in version 0.3.0.)

Hack The Box

Sign In to comment.