Something that I've found a little bit tedious at times when attacking machines is copying and pasting reverse shell payloads, changing the attacker IP address and port, and fiddling around with URL encoding, Base64 encoding, Gzip compression, etc.
There are some brilliant cheat sheets out there (like the highon.coffee Reverse Shell Cheat Sheet, for example), but to optimise things just that little bit further, I made a quick command-line tool (easily installable with
gem install lazypariah).
Here's the link to the Github page if anyone wants to give it a crack:
So far, it's got payloads for Python, Ruby, Perl, Bash, PHP, Netcat, Awk, Socat, Java and C. The Java and C payloads are compiled on the fly (and require OpenJDK and GCC respectively).
(2020/11/23: Edited to reflect changes in version 0.3.0.)