Some versions of bash can send you a reverse shell:
PERL
Perl Windows
Python
Works with python 2 or 3; substitute ‘python3’ if necessary
PHP
This code assumes that the TCP connection uses file descriptor 3. If it doesn’t work, try 4, 5, 6…
Base64 encrypted by @0xInfection:
Ruby
Netcat
Netcat is rarely present on production systems and even if it is there are several version of netcat, some of which don’t support the -e option.
This one is gold:
OpenBSD netcat
Java
xterm
One of the simplest forms of reverse shell is an xterm session. The following command should be run on the server. It will try to connect back to you (10.9.10.123) on TCP port 6001.
To catch the incoming xterm, start an X-Server (:1 – which listens on TCP port 6001). One way to do this is with Xnest (to be run on your system):
You’ll need to authorise the target to connect to you (command also run on your host):
socat
Golang
Node.js
Telnet
Remember to listen on 443 on the attacking machine also.