{% hint style="success" %} AWS 해킹 학습 및 실습:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ GCP 해킹 학습 및 실습: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
HackTricks 지원 * [**구독 요금제**](https://github.com/sponsors/carlospolop) 확인! * 💬 [**Discord 그룹**](https://discord.gg/hRep4RUj7f) 또는 [**텔레그램 그룹**](https://t.me/peass) 참여 또는 **트위터** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)** 팔로우**. * [**HackTricks**](https://github.com/carlospolop/hacktricks) 및 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) 깃헙 레포지토리에 PR 제출하여 해킹 트릭 공유.
{% endhint %} # [**쉘 - Linux**](linux.md) # [**쉘 - Windows**](windows.md) # [**MSFVenom - CheatSheet**](msfvenom.md) # [**전체 TTYs**](full-ttys.md) # **자동 생성된 쉘** * [**https://reverse-shell.sh/**](https://reverse-shell.sh/) * [**https://www.revshells.com/**](https://www.revshells.com/) * [**https://github.com/ShutdownRepo/shellerator**](https://github.com/ShutdownRepo/shellerator) * [**https://github.com/0x00-0x00/ShellPop**](https://github.com/0x00-0x00/ShellPop) * [**https://github.com/cybervaca/ShellReverse**](https://github.com/cybervaca/ShellReverse) * [**https://liftoff.github.io/pyminifier/**](https://liftoff.github.io/pyminifier/) * [**https://github.com/xct/xc/**](https://github.com/xct/xc/) * [**https://weibell.github.io/reverse-shell-generator/**](https://weibell.github.io/reverse-shell-generator/) * [**https://github.com/t0thkr1s/revshellgen**](https://github.com/t0thkr1s/revshellgen) * [**https://github.com/mthbernardes/rsg**](https://github.com/mthbernardes/rsg) {% hint style="success" %} AWS 해킹 학습 및 실습:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ GCP 해킹 학습 및 실습: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
HackTricks 지원 * [**구독 요금제**](https://github.com/sponsors/carlospolop) 확인! * 💬 [**Discord 그룹**](https://discord.gg/hRep4RUj7f) 또는 [**텔레그램 그룹**](https://t.me/peass) 참여 또는 **트위터** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)** 팔로우**. * [**HackTricks**](https://github.com/carlospolop/hacktricks) 및 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) 깃헙 레포지토리에 PR 제출하여 해킹 트릭 공유.
{% endhint %}