rsGen – Reverse Shell Payload Generator

superior_hosting_service

rsGen

rsGen is a Reverse Shell Payload Generator for hacking.


rsGen is a Reverse Shell Payload Generator for hacking. built by Windows Batch and Jscript. The main features include native command generation and variant command generation. In version 2.0, I added a tcp tunnel feature to receive shell(“-ngrok” and “-pgrok”).

I will be constantly updating this tool, if you have found any bugs or issues, please let me know via GitHub Issues and i will try my best to get it resolved quickly.

Usage

-pub  Generate a "variant command".Use this parameter,the Command will be encoded upload to the
        public pastebin website.
 -lan  In some cases, the target machine cannot request an external network.This parameter will call
       mongoose.exe in the command directory(a mini web server, only 144kb, see the website: 
       https://cesanta.com/), enable a web service on the local port 80 for command request execution.
       After the end, you need to manually exit it.
 -listen  Start port listening locally to receive shell that bounce back.Start port listening locally 
          to receive a shell that bounces back, Function equivalent to the netcat (call powercat.ps1).
 -ngrok  Start ngrok TCP Tunnel(Contains -pub, -listen options).
 -pgrok  Start pgrok TCP Tunnel(Contains -pub, -listen options).like ngrok but free and unlimited.
ngrok

Operating system

Windows 7 or higher Windows operating system.