Reverse shells, often referred to as remote shells or "connect-back shells," start a shell session on the target system in order to get access to the client's computer. The objective is to establish a connection to a distant computer and reroute the target system's shell's input and output connections so that the host computer can access it remotely. By forcing communication and permitting a full takeover of the client machine, reverse shells enable hosts to open ports to the target machines. It poses a serious security danger as a result. This technique is frequently employed in penetration tests. Reverse TCP allows the host to remotely control the victim system backdoor without the client's knowledge. The Windows default firewall simply monitors incoming traffic and ignores outbound traffic, which is a weakness that opens a back door. The reverse TCP payload connection must be opened by the client. In this system, application is backdoor is implemented in order to gain access to the client’s device. This project is developed for penetration testing and remote desktop connection purpose.