Shellcode Development

Name Brief Stages Command
Bind ShellOpens a port and waits for a connectionRemote Code Executionmsfvenom -p windows/x86/bind_tcp
Reverse ShellConnects to a remote hostRemote Code Executionmsfvenom -p windows/x86/reverse_tcp
Shellcode EncoderAvoids detection by modifying codeEvading Antivirusmsfvenom -e x86/shikata_ga_nai
Download & ExecuteDownloads and runs a fileRemote Code Executionmsfvenom -p windows/download_exec
Add UserCreates a new system userPrivilege Escalationmsfvenom -p windows/adduser
MeterpreterAdvanced shell with extended functionalitiesRemote Code Executionmsfvenom -p windows/meterpreter/reverse_tcp
VNC InjectionInjects VNC server for remote GUI accessRemote Accessmsfvenom -p windows/vncinject/reverse_tcp
Shellcode DecrypterDecrypts encrypted payload on targetEvading AntivirusCustom Assembly Required
File DeleterDeletes specified files from the systemPost ExploitationCustom Assembly Required
Port ScannerScans the local network for open portsInformation Gatheringmsfvenom -p windows/x86/portscan
Payload StagerDownloads the second stage of a payloadRemote Code Executionmsfvenom -p windows/x86/stager
Spawn ShellOpens a command shellRemote Code Executionmsfvenom -p windows/x86/shell_bind_tcp
Memory ExecuterExecutes a payload in memoryEvading AntivirusCustom Assembly Required
Keyboard LoggerCaptures keyboard inputInformation Gatheringmsfvenom -p windows/keylogger
Reboot MachineReboots the victim machineDenial of Servicemsfvenom -p windows/reboot
Disable FirewallTurns off the Windows firewallPost Exploitationmsfvenom -p windows/firewall_disable
Migrate ProcessMoves the shellcode to a different processPersistencemsfvenom -p windows/migrate
DNS ResolverResolves domain names to IP addressesInformation Gatheringmsfvenom -p windows/dns_resolver
Screen CaptureCaptures the current screen contentInformation Gatheringmsfvenom -p windows/screencap
Webcam CaptureAccesses and captures from the webcamInformation Gatheringmsfvenom -p windows/webcam
Audio CaptureRecords audio from the machine's microphoneInformation Gatheringmsfvenom -p windows/mic_recorder
UAC BypassAttempts to bypass User Account ControlPrivilege Escalationmsfvenom -p windows/uac_bypass
Windows Defender DisableDisables Windows Defender on the systemEvading Antivirusmsfvenom -p windows/defender_disable
Shellcode InjectorInjects a given shellcode into memoryRemote Code ExecutionCustom Assembly Required
File DropperDrops a file onto the systemPost Exploitationmsfvenom -p windows/dropper
File EncrypterEncrypts specified files, often used in ransomwareMalicious ActionsCustom Assembly Required
Socket ReuseReuses existing network socketsPost ExploitationCustom Assembly Required
Wake-on-LANWakes up a machine over a networkRemote Code Executionmsfvenom -p windows/wake_on_lan
DLL InjectorInjects a DLL into a processRemote Code Executionmsfvenom -p windows/dll_inject
Clipboard MonitorMonitors and captures clipboard contentInformation Gatheringmsfvenom -p windows/clipboard_monitor
Service ManipulatorStarts, stops, or modifies Windows servicesPost Exploitationmsfvenom -p windows/service_manager
Packet SnifferSniffs network packetsInformation Gatheringmsfvenom -p windows/sniffer
HTTP/S ProxyTurns the victim machine into an HTTP/S proxyPost Exploitationmsfvenom -p windows/proxy_http
SOCKS ProxyTurns the victim machine into a SOCKS proxyPost Exploitationmsfvenom -p windows/proxy_socks
Windows Credential DumperDumps saved credentialsInformation Gatheringmsfvenom -p windows/creds_dump
Registry EditorManipulates the Windows registryPost Exploitationmsfvenom -p windows/reg_edit
Remote Desktop EnableEnables remote desktop on the victim machineRemote Accessmsfvenom -p windows/rdp_enable
SSH Key LoggerCaptures SSH key strokesInformation Gatheringmsfvenom -p windows/ssh_keylog
Process KillerTerminates specified processesPost Exploitationmsfvenom -p windows/kill_process
File FinderSearches for specified files on the systemInformation Gatheringmsfvenom -p windows/file_search
Message Box PopperDisplays a message box on the victim machineNon-malicious Prankmsfvenom -p windows/messagebox
Windows Event LoggerLogs events in the Windows Event ViewerPost Exploitationmsfvenom -p windows/eventlog_write
File BinderBinds files togetherPost ExploitationCustom Assembly Required