Sponsored
Exploiting Tools

One-Lin3r : Fastest Way to Create Reverse Shell & Privesc Commands

Hey Folks, The tool we’re going to talk about today that can save time from wasting. Usually during the hacking, penetration testing and especially privilege escalation we have to need some different shells called “one-liners” to compromise the machine which takes longer but it provide us (CLI) interface which helps to create multiple shell on one click.

Lets take a look 🙂 !!

Installation

Installation of this tool is quite simple, first we have to meet some requirements of this tool by installing pip tool on our system.

apt install python3-pip

Now we will download “one-lin3r” tool using the given command.

pip3 install one-lin3r

If you face some error while running this tool then you can use the following command.

pip3 install prompt-toolkit --force-reinstall

After doing this, our tool is ready to run. Just execute the given command.

one-lin3r

List

This provides us several one-liners that we can view using the list command..

Search

With the help of search command we can find one-liners as per the need.

Variables

This command is used to check the target IP address and port number that we enter to create one-liners.

Create one-liner

Now the time has come to create a one-liner and for this mission we have to set our local host IP address to the target option and port can select as per choice but in our case we will choose 4444.

After setting all this, we can create by simply giving the name of the shell.

We can get access of any linux machine using the above shell. For an example we will paste it on another kali linux machine.

As you can see we have got complete control of the other Kali Linux system only by executing the generated shell.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin .
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.