Let's perform the following steps:
- Clone the repository using the following command:
git clone https://github.com/0xR0/shellver.git
- Go to the directory and run the setup using the following command:
python setup.py -i
- Once installation is complete, run the tool with the -h flag to see all of the options available to us. It will show us the following output:
- Try to generate a reverse shell using the following command:
shellver shell
- It will ask us to choose the interface, as shown in the following screenshot:
- Type your choice and press Enter; it will then ask us the port number entering, which the tool will then generate and print commands for different types of reverse shell, as shown in the following screenshot:
- The tool also starts the listener on the same port for any connections that we will receive upon running the reverse shell commands printed previously:
- Let's look at another example of generating a Metasploit reverse shell. Type the following command:
shellver msf
- The tool asks us to enter the payload type we want to create. We chose Linux binaries so enter 1:
- Choose the interface and port number, as shown in the following screenshot:
Our payload is ready in no time.