rsGen – Reverse Shell Payload Generator

rsGen

rsGen is a Reverse Shell Payload Generator for hacking. I write through windows batch. The main features include native command generation and variant command generation. In version 2.0, I added a tcp tunnel feature to receive shell(“-ngrok” and “-pgrok”).

I will be constantly updating this tool, if you have found any bugs or issues, please let me know via GitHub Issues and i will try my best to get it resolved quickly.

Usage


-pub  Generate a "variant command".Use this parameter,the Command will be encoded upload to the
       public pastebin website.

-lan  In some cases, the target machine cannot request an external network.This parameter will call
      mongoose.exe in the command directory(a mini web server, only 144kb, see the website: 
      https://cesanta.com/), enable a web service on the local port 80 for command request execution.
      After the end, you need to manually exit it.

-listen  Start port listening locally to receive shell that bounce back.Start port listening locally 
         to receive a shell that bounces back, Function equivalent to the netcat (call powercat.ps1).

-ngrok  Start ngrok TCP Tunnel(Contains -pub, -listen options).

-pgrok  Start pgrok TCP Tunnel(Contains -pub, -listen options).like ngrok but free and unlimited.

rsGen

Download: https://github.com/FlyfishSec/rsGen

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *