windows-php-reverse-shell icon indicating copy to clipboard operation
windows-php-reverse-shell copied to clipboard

Simple php reverse shell implemented using binary .

Results 3 windows-php-reverse-shell issues
Sort by recently updated
recently updated
newest added

There is a warning when you run this php script: ![php_reverse_shell](https://user-images.githubusercontent.com/2428331/136764479-2cffb82e-560d-495b-b4d5-7ac481d9be16.png) In line 11, you can't use `$res .=` because there is not a `$res` variable before. ![php_reverse_shell_2](https://user-images.githubusercontent.com/2428331/136764700-297a19b0-dfd9-42e6-a9c6-e82865cac304.png)

Hey there this is great, im studying my OSCP - just wondering, how did you generate the $payload? I would like to understand in more detail how this works? thanks

If you get the above error, change ```$output = system($cmd);``` to ```$output = exec($cmd);``` or ```$output = passthru($cmd);``` Whilst ```exec``` and ```pasthru``` may also be disabled, they are less likely...