Add: export payloads to .txt based on current IP, port, and OS values #187
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Thank you for this cool repository. It has been incredibly helpful for my studies.
I saw an opportunity to add a feature that I believe could be useful for others as well. This feature allows users to export reverse shell payloads to a .txt file based on the current IP, port, and OS values. It’s particularly useful in CTFs, where you often need to test multiple payloads to find the one that works, and using this with tools like Burp Intruder can save a lot of time.
To make it more practical, I eliminated multi-line payloads and kept only one-liners for simplicity and compatibility. I hope the author and the community will find this addition as useful as I do.
Thank you again for maintaining this awesome project! I am open for suggestions regarding this PR.