Skip to main content
Glama

kali_exploit_msfvenom_generate

Generate custom Metasploit payloads for authorized security testing by specifying payload type, target host/port, and output format.

Instructions

Generate custom payloads for Metasploit Framework.

Msfvenom is a payload generator and encoder combining msfpayload and msfencode.

WARNING: Only use generated payloads for authorized security testing.

Common Payloads:

  • windows/meterpreter/reverse_tcp

  • linux/x64/shell_reverse_tcp

  • php/meterpreter/reverse_tcp

Example:

  • payload="linux/x64/shell_reverse_tcp", lhost="192.168.1.100", lport=4444, format="elf"

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
payloadYesPayload type (e.g., 'windows/meterpreter/reverse_tcp', 'linux/x64/shell_reverse_tcp')
lhostYesLocal host IP for reverse connections
lportYesLocal port for reverse connections
formatNoOutput formatraw
archNoTarget architecture
platformNoTarget platform
encoderNoEncoder to use (e.g., 'x86/shikata_ga_nai')
iterationsNoNumber of encoding iterations
output_fileNoOutput file path

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/azza39925/kali-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server