A simple tool for creating reverse shell-like connections to execute commands remotely.
simple connect-back payloads
This tool is primarily used in penetration testing and red teaming scenarios to establish a connection back to an attacker's machine. Security professionals can utilize it to execute commands on a target system remotely after establishing a connection.
This tool is intended for educational purposes only; users should not engage in illegal activities.
Clone the repository using git
Navigate to the directory containing the scripts
Start a netcat server to listen for connections
nc -lv 127.0.0.1 8000
Starts a netcat server listening on IP 127.0.0.1 and port 8000.