Framework Payloads (1463 total) [--payload ]

Name                                                               Description
----                                                               -----------
aix/ppc/shell_bind_tcp                                             Listen for a connection and spawn a command shell
aix/ppc/shell_find_port                                            Spawn a shell on an established connection
aix/ppc/shell_interact                                             Simply execve /bin/sh (for inetd programs)
aix/ppc/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
android/meterpreter/reverse_http                                   Run a meterpreter server in Android. Tunnel communication over HTTP
android/meterpreter/reverse_https                                  Run a meterpreter server in Android. Tunnel communication over HTTPS
android/meterpreter/reverse_tcp                                    Run a meterpreter server in Android. Connect back stager
android/meterpreter_reverse_http                                   Connect back to attacker and spawn a Meterpreter shell
android/meterpreter_reverse_https                                  Connect back to attacker and spawn a Meterpreter shell
android/meterpreter_reverse_tcp                                    Connect back to the attacker and spawn a Meterpreter shell
android/shell/reverse_http                                         Spawn a piped command shell (sh). Tunnel communication over HTTP
android/shell/reverse_https                                        Spawn a piped command shell (sh). Tunnel communication over HTTPS
android/shell/reverse_tcp                                          Spawn a piped command shell (sh). Connect back stager
apple_ios/aarch64/meterpreter_reverse_http                         Run the Meterpreter / Mettle server payload (stageless)
apple_ios/aarch64/meterpreter_reverse_https                        Run the Meterpreter / Mettle server payload (stageless)
apple_ios/aarch64/meterpreter_reverse_tcp                          Run the Meterpreter / Mettle server payload (stageless)
apple_ios/aarch64/shell_reverse_tcp                                Connect back to attacker and spawn a command shell
apple_ios/armle/meterpreter_reverse_http                           Run the Meterpreter / Mettle server payload (stageless)
apple_ios/armle/meterpreter_reverse_https                          Run the Meterpreter / Mettle server payload (stageless)
apple_ios/armle/meterpreter_reverse_tcp                            Run the Meterpreter / Mettle server payload (stageless)
bsd/sparc/shell_bind_tcp                                           Listen for a connection and spawn a command shell
bsd/sparc/shell_reverse_tcp                                        Connect back to attacker and spawn a command shell
bsd/vax/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
bsd/x64/exec                                                       Execute an arbitrary command
bsd/x64/shell_bind_ipv6_tcp                                        Listen for a connection and spawn a command shell over IPv6
bsd/x64/shell_bind_tcp                                             Bind an arbitrary command to an arbitrary port
bsd/x64/shell_bind_tcp_small                                       Listen for a connection and spawn a command shell
bsd/x64/shell_reverse_ipv6_tcp                                     Connect back to attacker and spawn a command shell over IPv6
bsd/x64/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
bsd/x64/shell_reverse_tcp_small                                    Connect back to attacker and spawn a command shell
bsd/x86/exec                                                       Execute an arbitrary command
bsd/x86/metsvc_bind_tcp                                            Stub payload for interacting with a Meterpreter Service
bsd/x86/metsvc_reverse_tcp                                         Stub payload for interacting with a Meterpreter Service
bsd/x86/shell/bind_ipv6_tcp                                        Spawn a command shell (staged). Listen for a connection over IPv6
bsd/x86/shell/bind_tcp                                             Spawn a command shell (staged). Listen for a connection
bsd/x86/shell/find_tag                                             Spawn a command shell (staged). Use an established connection
bsd/x86/shell/reverse_ipv6_tcp                                     Spawn a command shell (staged). Connect back to the attacker over IPv6
bsd/x86/shell/reverse_tcp                                          Spawn a command shell (staged). Connect back to the attacker
bsd/x86/shell_bind_tcp                                             Listen for a connection and spawn a command shell
bsd/x86/shell_bind_tcp_ipv6                                        Listen for a connection and spawn a command shell over IPv6
bsd/x86/shell_find_port                                            Spawn a shell on an established connection
bsd/x86/shell_find_tag                                             Spawn a shell on an established connection (proxy/nat safe)
bsd/x86/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
bsd/x86/shell_reverse_tcp_ipv6                                     Connect back to attacker and spawn a command shell over IPv6
bsdi/x86/shell/bind_tcp                                            Spawn a command shell (staged). Listen for a connection
bsdi/x86/shell/reverse_tcp                                         Spawn a command shell (staged). Connect back to the attacker
bsdi/x86/shell_bind_tcp                                            Listen for a connection and spawn a command shell
bsdi/x86/shell_find_port                                           Spawn a shell on an established connection
bsdi/x86/shell_reverse_tcp                                         Connect back to attacker and spawn a command shell
cmd/linux/http/mips64/meterpreter_reverse_http                     Fetch and execute a MIPS64 payload from an HTTP server.
cmd/linux/http/mips64/meterpreter_reverse_https                    Fetch and execute a MIPS64 payload from an HTTP server.
cmd/linux/http/mips64/meterpreter_reverse_tcp                      Fetch and execute a MIPS64 payload from an HTTP server.
cmd/linux/http/x64/exec                                            Fetch and execute an x64 payload from an HTTP server. Execute an arbitrary command or just a /bin/sh shell
cmd/linux/http/x64/meterpreter/bind_tcp                            Fetch and execute an x64 payload from an HTTP server. Listen for a connection
cmd/linux/http/x64/meterpreter/reverse_sctp                        Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/linux/http/x64/meterpreter/reverse_tcp                         Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/linux/http/x64/meterpreter_reverse_http                        Fetch and execute an x64 payload from an HTTP server.
cmd/linux/http/x64/meterpreter_reverse_https                       Fetch and execute an x64 payload from an HTTP server.
cmd/linux/http/x64/meterpreter_reverse_tcp                         Fetch and execute an x64 payload from an HTTP server.
cmd/linux/http/x64/pingback_bind_tcp                               Fetch and execute an x64 payload from an HTTP server. Accept a connection from attacker and report UUID (Linux x64)
cmd/linux/http/x64/pingback_reverse_tcp                            Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and report UUID (Linux x64)
cmd/linux/http/x64/shell/bind_tcp                                  Fetch and execute an x64 payload from an HTTP server. Spawn a command shell (staged). Listen for a connection
cmd/linux/http/x64/shell/reverse_sctp                              Fetch and execute an x64 payload from an HTTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/http/x64/shell/reverse_tcp                               Fetch and execute an x64 payload from an HTTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/http/x64/shell_bind_ipv6_tcp                             Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection and spawn a command shell
cmd/linux/http/x64/shell_bind_tcp                                  Fetch and execute an x64 payload from an HTTP server. Listen for a connection and spawn a command shell
cmd/linux/http/x64/shell_bind_tcp_random_port                      Fetch and execute an x64 payload from an HTTP server. Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
cmd/linux/http/x64/shell_find_port                                 Fetch and execute an x64 payload from an HTTP server. Spawn a shell on an established connection
cmd/linux/http/x64/shell_reverse_ipv6_tcp                          Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a command shell over IPv6
cmd/linux/http/x64/shell_reverse_tcp                               Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a command shell
cmd/linux/http/x86/adduser                                         Fetch and execute a x86 payload from an HTTP server. Create a new user with UID 0
cmd/linux/http/x86/chmod                                           Fetch and execute a x86 payload from an HTTP server. Runs chmod on specified file with specified mode
cmd/linux/http/x86/exec                                            Fetch and execute a x86 payload from an HTTP server. Execute an arbitrary command or just a /bin/sh shell
cmd/linux/http/x86/generic/debug_trap                              Fetch and execute a x86 payload from an HTTP server. Generate a debug trap in the target process
cmd/linux/http/x86/generic/tight_loop                              Fetch and execute a x86 payload from an HTTP server. Generate a tight loop in the target process
cmd/linux/http/x86/meterpreter/bind_ipv6_tcp                       Fetch and execute a x86 payload from an HTTP server. Listen for an IPv6 connection (Linux x86)
cmd/linux/http/x86/meterpreter/bind_ipv6_tcp_uuid                  Fetch and execute a x86 payload from an HTTP server. Listen for an IPv6 connection with UUID Support (Linux x86)
cmd/linux/http/x86/meterpreter/bind_nonx_tcp                       Fetch and execute a x86 payload from an HTTP server. Listen for a connection
cmd/linux/http/x86/meterpreter/bind_tcp                            Fetch and execute a x86 payload from an HTTP server. Listen for a connection (Linux x86)
cmd/linux/http/x86/meterpreter/bind_tcp_uuid                       Fetch and execute a x86 payload from an HTTP server. Listen for a connection with UUID Support (Linux x86)
cmd/linux/http/x86/meterpreter/find_tag                            Fetch and execute a x86 payload from an HTTP server. Use an established connection
cmd/linux/http/x86/meterpreter/reverse_ipv6_tcp                    Fetch and execute a x86 payload from an HTTP server. Connect back to attacker over IPv6
cmd/linux/http/x86/meterpreter/reverse_nonx_tcp                    Fetch and execute a x86 payload from an HTTP server. Connect back to the attacker
cmd/linux/http/x86/meterpreter/reverse_tcp                         Fetch and execute a x86 payload from an HTTP server. Connect back to the attacker
cmd/linux/http/x86/meterpreter/reverse_tcp_uuid                    Fetch and execute a x86 payload from an HTTP server. Connect back to the attacker
cmd/linux/http/x86/meterpreter_reverse_http                        Fetch and execute a x86 payload from an HTTP server.
cmd/linux/http/x86/meterpreter_reverse_https                       Fetch and execute a x86 payload from an HTTP server.
cmd/linux/http/x86/meterpreter_reverse_tcp                         Fetch and execute a x86 payload from an HTTP server.
cmd/linux/http/x86/metsvc_bind_tcp                                 Fetch and execute a x86 payload from an HTTP server. Stub payload for interacting with a Meterpreter Service
cmd/linux/http/x86/metsvc_reverse_tcp                              Fetch and execute a x86 payload from an HTTP server. Stub payload for interacting with a Meterpreter Service
cmd/linux/http/x86/read_file                                       Fetch and execute a x86 payload from an HTTP server. Read up to 4096 bytes from the local file system and write it back out to the specified file descriptor
cmd/linux/http/x86/shell/bind_ipv6_tcp                             Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Listen for an IPv6 connection (Linux x86)
cmd/linux/http/x86/shell/bind_ipv6_tcp_uuid                        Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Listen for an IPv6 connection with UUID Support (Linux x86)
cmd/linux/http/x86/shell/bind_nonx_tcp                             Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Listen for a connection
cmd/linux/http/x86/shell/bind_tcp                                  Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Listen for a connection (Linux x86)
cmd/linux/http/x86/shell/bind_tcp_uuid                             Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Listen for a connection with UUID Support (Linux x86)
cmd/linux/http/x86/shell/find_tag                                  Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Use an established connection
cmd/linux/http/x86/shell/reverse_ipv6_tcp                          Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Connect back to attacker over IPv6
cmd/linux/http/x86/shell/reverse_nonx_tcp                          Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/http/x86/shell/reverse_tcp                               Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/http/x86/shell/reverse_tcp_uuid                          Fetch and execute a x86 payload from an HTTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/http/x86/shell_bind_ipv6_tcp                             Fetch and execute a x86 payload from an HTTP server. Listen for a connection over IPv6 and spawn a command shell
cmd/linux/http/x86/shell_bind_tcp                                  Fetch and execute a x86 payload from an HTTP server. Listen for a connection and spawn a command shell
cmd/linux/http/x86/shell_bind_tcp_random_port                      Fetch and execute a x86 payload from an HTTP server. Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
cmd/linux/http/x86/shell_find_port                                 Fetch and execute a x86 payload from an HTTP server. Spawn a shell on an established connection
cmd/linux/http/x86/shell_find_tag                                  Fetch and execute a x86 payload from an HTTP server. Spawn a shell on an established connection (proxy/nat safe)
cmd/linux/http/x86/shell_reverse_tcp                               Fetch and execute a x86 payload from an HTTP server. Connect back to attacker and spawn a command shell
cmd/linux/http/x86/shell_reverse_tcp_ipv6                          Fetch and execute a x86 payload from an HTTP server. Connect back to attacker and spawn a command shell over IPv6
cmd/linux/https/mips64/meterpreter_reverse_http                    Fetch and execute an MIPS64 payload from an HTTPS server.
cmd/linux/https/mips64/meterpreter_reverse_https                   Fetch and execute an MIPS64 payload from an HTTPS server.
cmd/linux/https/mips64/meterpreter_reverse_tcp                     Fetch and execute an MIPS64 payload from an HTTPS server.
cmd/linux/https/x64/exec                                           Fetch and execute an x64 payload from an HTTPS server. Execute an arbitrary command or just a /bin/sh shell
cmd/linux/https/x64/meterpreter/bind_tcp                           Fetch and execute an x64 payload from an HTTPS server. Listen for a connection
cmd/linux/https/x64/meterpreter/reverse_sctp                       Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/linux/https/x64/meterpreter/reverse_tcp                        Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/linux/https/x64/meterpreter_reverse_http                       Fetch and execute an x64 payload from an HTTPS server.
cmd/linux/https/x64/meterpreter_reverse_https                      Fetch and execute an x64 payload from an HTTPS server.
cmd/linux/https/x64/meterpreter_reverse_tcp                        Fetch and execute an x64 payload from an HTTPS server.
cmd/linux/https/x64/pingback_bind_tcp                              Fetch and execute an x64 payload from an HTTPS server. Accept a connection from attacker and report UUID (Linux x64)
cmd/linux/https/x64/pingback_reverse_tcp                           Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and report UUID (Linux x64)
cmd/linux/https/x64/shell/bind_tcp                                 Fetch and execute an x64 payload from an HTTPS server. Spawn a command shell (staged). Listen for a connection
cmd/linux/https/x64/shell/reverse_sctp                             Fetch and execute an x64 payload from an HTTPS server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/https/x64/shell/reverse_tcp                              Fetch and execute an x64 payload from an HTTPS server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/https/x64/shell_bind_ipv6_tcp                            Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection and spawn a command shell
cmd/linux/https/x64/shell_bind_tcp                                 Fetch and execute an x64 payload from an HTTPS server. Listen for a connection and spawn a command shell
cmd/linux/https/x64/shell_bind_tcp_random_port                     Fetch and execute an x64 payload from an HTTPS server. Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
cmd/linux/https/x64/shell_find_port                                Fetch and execute an x64 payload from an HTTPS server. Spawn a shell on an established connection
cmd/linux/https/x64/shell_reverse_ipv6_tcp                         Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a command shell over IPv6
cmd/linux/https/x64/shell_reverse_tcp                              Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a command shell
cmd/linux/https/x86/adduser                                        Fetch and execute an x86 payload from an HTTPS server. Create a new user with UID 0
cmd/linux/https/x86/chmod                                          Fetch and execute an x86 payload from an HTTPS server. Runs chmod on specified file with specified mode
cmd/linux/https/x86/exec                                           Fetch and execute an x86 payload from an HTTPS server. Execute an arbitrary command or just a /bin/sh shell
cmd/linux/https/x86/generic/debug_trap                             Fetch and execute an x86 payload from an HTTPS server. Generate a debug trap in the target process
cmd/linux/https/x86/generic/tight_loop                             Fetch and execute an x86 payload from an HTTPS server. Generate a tight loop in the target process
cmd/linux/https/x86/meterpreter/bind_ipv6_tcp                      Fetch and execute an x86 payload from an HTTPS server. Listen for an IPv6 connection (Linux x86)
cmd/linux/https/x86/meterpreter/bind_ipv6_tcp_uuid                 Fetch and execute an x86 payload from an HTTPS server. Listen for an IPv6 connection with UUID Support (Linux x86)
cmd/linux/https/x86/meterpreter/bind_nonx_tcp                      Fetch and execute an x86 payload from an HTTPS server. Listen for a connection
cmd/linux/https/x86/meterpreter/bind_tcp                           Fetch and execute an x86 payload from an HTTPS server. Listen for a connection (Linux x86)
cmd/linux/https/x86/meterpreter/bind_tcp_uuid                      Fetch and execute an x86 payload from an HTTPS server. Listen for a connection with UUID Support (Linux x86)
cmd/linux/https/x86/meterpreter/find_tag                           Fetch and execute an x86 payload from an HTTPS server. Use an established connection
cmd/linux/https/x86/meterpreter/reverse_ipv6_tcp                   Fetch and execute an x86 payload from an HTTPS server. Connect back to attacker over IPv6
cmd/linux/https/x86/meterpreter/reverse_nonx_tcp                   Fetch and execute an x86 payload from an HTTPS server. Connect back to the attacker
cmd/linux/https/x86/meterpreter/reverse_tcp                        Fetch and execute an x86 payload from an HTTPS server. Connect back to the attacker
cmd/linux/https/x86/meterpreter/reverse_tcp_uuid                   Fetch and execute an x86 payload from an HTTPS server. Connect back to the attacker
cmd/linux/https/x86/meterpreter_reverse_http                       Fetch and execute an x86 payload from an HTTPS server.
cmd/linux/https/x86/meterpreter_reverse_https                      Fetch and execute an x86 payload from an HTTPS server.
cmd/linux/https/x86/meterpreter_reverse_tcp                        Fetch and execute an x86 payload from an HTTPS server.
cmd/linux/https/x86/metsvc_bind_tcp                                Fetch and execute an x86 payload from an HTTPS server. Stub payload for interacting with a Meterpreter Service
cmd/linux/https/x86/metsvc_reverse_tcp                             Fetch and execute an x86 payload from an HTTPS server. Stub payload for interacting with a Meterpreter Service
cmd/linux/https/x86/read_file                                      Fetch and execute an x86 payload from an HTTPS server. Read up to 4096 bytes from the local file system and write it back out to the specified file descriptor
cmd/linux/https/x86/shell/bind_ipv6_tcp                            Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Listen for an IPv6 connection (Linux x86)
cmd/linux/https/x86/shell/bind_ipv6_tcp_uuid                       Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Listen for an IPv6 connection with UUID Support (Linux x86)
cmd/linux/https/x86/shell/bind_nonx_tcp                            Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Listen for a connection
cmd/linux/https/x86/shell/bind_tcp                                 Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Listen for a connection (Linux x86)
cmd/linux/https/x86/shell/bind_tcp_uuid                            Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Listen for a connection with UUID Support (Linux x86)
cmd/linux/https/x86/shell/find_tag                                 Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Use an established connection
cmd/linux/https/x86/shell/reverse_ipv6_tcp                         Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Connect back to attacker over IPv6
cmd/linux/https/x86/shell/reverse_nonx_tcp                         Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/https/x86/shell/reverse_tcp                              Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/https/x86/shell/reverse_tcp_uuid                         Fetch and execute an x86 payload from an HTTPS server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/https/x86/shell_bind_ipv6_tcp                            Fetch and execute an x86 payload from an HTTPS server. Listen for a connection over IPv6 and spawn a command shell
cmd/linux/https/x86/shell_bind_tcp                                 Fetch and execute an x86 payload from an HTTPS server. Listen for a connection and spawn a command shell
cmd/linux/https/x86/shell_bind_tcp_random_port                     Fetch and execute an x86 payload from an HTTPS server. Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
cmd/linux/https/x86/shell_find_port                                Fetch and execute an x86 payload from an HTTPS server. Spawn a shell on an established connection
cmd/linux/https/x86/shell_find_tag                                 Fetch and execute an x86 payload from an HTTPS server. Spawn a shell on an established connection (proxy/nat safe)
cmd/linux/https/x86/shell_reverse_tcp                              Fetch and execute an x86 payload from an HTTPS server. Connect back to attacker and spawn a command shell
cmd/linux/https/x86/shell_reverse_tcp_ipv6                         Fetch and execute an x86 payload from an HTTPS server. Connect back to attacker and spawn a command shell over IPv6
cmd/linux/tftp/mips64/meterpreter_reverse_http                     Fetch and execute a MIPS64 payload from a TFTP server.
cmd/linux/tftp/mips64/meterpreter_reverse_https                    Fetch and execute a MIPS64 payload from a TFTP server.
cmd/linux/tftp/mips64/meterpreter_reverse_tcp                      Fetch and execute a MIPS64 payload from a TFTP server.
cmd/linux/tftp/x64/exec                                            Fetch and execute an x64 payload from a TFTP server. Execute an arbitrary command or just a /bin/sh shell
cmd/linux/tftp/x64/meterpreter/bind_tcp                            Fetch and execute an x64 payload from a TFTP server. Listen for a connection
cmd/linux/tftp/x64/meterpreter/reverse_sctp                        Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/linux/tftp/x64/meterpreter/reverse_tcp                         Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/linux/tftp/x64/meterpreter_reverse_http                        Fetch and execute an x64 payload from a TFTP server.
cmd/linux/tftp/x64/meterpreter_reverse_https                       Fetch and execute an x64 payload from a TFTP server.
cmd/linux/tftp/x64/meterpreter_reverse_tcp                         Fetch and execute an x64 payload from a TFTP server.
cmd/linux/tftp/x64/pingback_bind_tcp                               Fetch and execute an x64 payload from a TFTP server. Accept a connection from attacker and report UUID (Linux x64)
cmd/linux/tftp/x64/pingback_reverse_tcp                            Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and report UUID (Linux x64)
cmd/linux/tftp/x64/shell/bind_tcp                                  Fetch and execute an x64 payload from a TFTP server. Spawn a command shell (staged). Listen for a connection
cmd/linux/tftp/x64/shell/reverse_sctp                              Fetch and execute an x64 payload from a TFTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/tftp/x64/shell/reverse_tcp                               Fetch and execute an x64 payload from a TFTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/tftp/x64/shell_bind_ipv6_tcp                             Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection and spawn a command shell
cmd/linux/tftp/x64/shell_bind_tcp                                  Fetch and execute an x64 payload from a TFTP server. Listen for a connection and spawn a command shell
cmd/linux/tftp/x64/shell_bind_tcp_random_port                      Fetch and execute an x64 payload from a TFTP server. Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
cmd/linux/tftp/x64/shell_find_port                                 Fetch and execute an x64 payload from a TFTP server. Spawn a shell on an established connection
cmd/linux/tftp/x64/shell_reverse_ipv6_tcp                          Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a command shell over IPv6
cmd/linux/tftp/x64/shell_reverse_tcp                               Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a command shell
cmd/linux/tftp/x86/adduser                                         Fetch and execute a x86 payload from a TFTP server. Create a new user with UID 0
cmd/linux/tftp/x86/chmod                                           Fetch and execute a x86 payload from a TFTP server. Runs chmod on specified file with specified mode
cmd/linux/tftp/x86/exec                                            Fetch and execute a x86 payload from a TFTP server. Execute an arbitrary command or just a /bin/sh shell
cmd/linux/tftp/x86/generic/debug_trap                              Fetch and execute a x86 payload from a TFTP server. Generate a debug trap in the target process
cmd/linux/tftp/x86/generic/tight_loop                              Fetch and execute a x86 payload from a TFTP server. Generate a tight loop in the target process
cmd/linux/tftp/x86/meterpreter/bind_ipv6_tcp                       Fetch and execute a x86 payload from a TFTP server. Listen for an IPv6 connection (Linux x86)
cmd/linux/tftp/x86/meterpreter/bind_ipv6_tcp_uuid                  Fetch and execute a x86 payload from a TFTP server. Listen for an IPv6 connection with UUID Support (Linux x86)
cmd/linux/tftp/x86/meterpreter/bind_nonx_tcp                       Fetch and execute a x86 payload from a TFTP server. Listen for a connection
cmd/linux/tftp/x86/meterpreter/bind_tcp                            Fetch and execute a x86 payload from a TFTP server. Listen for a connection (Linux x86)
cmd/linux/tftp/x86/meterpreter/bind_tcp_uuid                       Fetch and execute a x86 payload from a TFTP server. Listen for a connection with UUID Support (Linux x86)
cmd/linux/tftp/x86/meterpreter/find_tag                            Fetch and execute a x86 payload from a TFTP server. Use an established connection
cmd/linux/tftp/x86/meterpreter/reverse_ipv6_tcp                    Fetch and execute a x86 payload from a TFTP server. Connect back to attacker over IPv6
cmd/linux/tftp/x86/meterpreter/reverse_nonx_tcp                    Fetch and execute a x86 payload from a TFTP server. Connect back to the attacker
cmd/linux/tftp/x86/meterpreter/reverse_tcp                         Fetch and execute a x86 payload from a TFTP server. Connect back to the attacker
cmd/linux/tftp/x86/meterpreter/reverse_tcp_uuid                    Fetch and execute a x86 payload from a TFTP server. Connect back to the attacker
cmd/linux/tftp/x86/meterpreter_reverse_http                        Fetch and execute a x86 payload from a TFTP server.
cmd/linux/tftp/x86/meterpreter_reverse_https                       Fetch and execute a x86 payload from a TFTP server.
cmd/linux/tftp/x86/meterpreter_reverse_tcp                         Fetch and execute a x86 payload from a TFTP server.
cmd/linux/tftp/x86/metsvc_bind_tcp                                 Fetch and execute a x86 payload from a TFTP server. Stub payload for interacting with a Meterpreter Service
cmd/linux/tftp/x86/metsvc_reverse_tcp                              Fetch and execute a x86 payload from a TFTP server. Stub payload for interacting with a Meterpreter Service
cmd/linux/tftp/x86/read_file                                       Fetch and execute a x86 payload from a TFTP server. Read up to 4096 bytes from the local file system and write it back out to the specified file descriptor
cmd/linux/tftp/x86/shell/bind_ipv6_tcp                             Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Listen for an IPv6 connection (Linux x86)
cmd/linux/tftp/x86/shell/bind_ipv6_tcp_uuid                        Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Listen for an IPv6 connection with UUID Support (Linux x86)
cmd/linux/tftp/x86/shell/bind_nonx_tcp                             Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Listen for a connection
cmd/linux/tftp/x86/shell/bind_tcp                                  Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Listen for a connection (Linux x86)
cmd/linux/tftp/x86/shell/bind_tcp_uuid                             Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Listen for a connection with UUID Support (Linux x86)
cmd/linux/tftp/x86/shell/find_tag                                  Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Use an established connection
cmd/linux/tftp/x86/shell/reverse_ipv6_tcp                          Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Connect back to attacker over IPv6
cmd/linux/tftp/x86/shell/reverse_nonx_tcp                          Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/tftp/x86/shell/reverse_tcp                               Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/tftp/x86/shell/reverse_tcp_uuid                          Fetch and execute a x86 payload from a TFTP server. Spawn a command shell (staged). Connect back to the attacker
cmd/linux/tftp/x86/shell_bind_ipv6_tcp                             Fetch and execute a x86 payload from a TFTP server. Listen for a connection over IPv6 and spawn a command shell
cmd/linux/tftp/x86/shell_bind_tcp                                  Fetch and execute a x86 payload from a TFTP server. Listen for a connection and spawn a command shell
cmd/linux/tftp/x86/shell_bind_tcp_random_port                      Fetch and execute a x86 payload from a TFTP server. Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
cmd/linux/tftp/x86/shell_find_port                                 Fetch and execute a x86 payload from a TFTP server. Spawn a shell on an established connection
cmd/linux/tftp/x86/shell_find_tag                                  Fetch and execute a x86 payload from a TFTP server. Spawn a shell on an established connection (proxy/nat safe)
cmd/linux/tftp/x86/shell_reverse_tcp                               Fetch and execute a x86 payload from a TFTP server. Connect back to attacker and spawn a command shell
cmd/linux/tftp/x86/shell_reverse_tcp_ipv6                          Fetch and execute a x86 payload from a TFTP server. Connect back to attacker and spawn a command shell over IPv6
cmd/mainframe/apf_privesc_jcl                                      (Elevate privileges for user. Adds SYSTEM SPECIAL and BPX.SUPERUSER to user profile. Does this by using an unsecured/updateable APF authorized library (APFLIB) and updating the user's ACEE using this program/library. Note: This privesc only works with z/OS systems using RACF, no other ESM is supported.)
cmd/mainframe/bind_shell_jcl                                       Provide JCL which creates a bind shell This implementation does not include ebcdic character translation, so a client with translation capabilities is required. MSF handles this automatically.
cmd/mainframe/generic_jcl                                          Provide JCL which can be used to submit a job to JES2 on z/OS which will exit and return 0. This can be used as a template for other JCL based payloads
cmd/mainframe/reverse_shell_jcl                                    Provide JCL which creates a reverse shell This implementation does not include ebcdic character translation, so a client with translation capabilities is required. MSF handles this automatically.
cmd/unix/adduser                                                   Creates a new user. By default the new user is set with sudo but other options exist to make the new user automatically root but this is not automatically set since the new user will be treated as root (and login may be difficult). The new user can also be set as just a standard user if desired.
cmd/unix/bind_awk                                                  Listen for a connection and spawn a command shell via GNU AWK
cmd/unix/bind_aws_instance_connect                                 Creates an SSH shell using AWS Instance Connect
cmd/unix/bind_busybox_telnetd                                      Listen for a connection and spawn a command shell via BusyBox telnetd
cmd/unix/bind_inetd                                                Listen for a connection and spawn a command shell (persistent)
cmd/unix/bind_jjs                                                  Listen for a connection and spawn a command shell via jjs
cmd/unix/bind_lua                                                  Listen for a connection and spawn a command shell via Lua
cmd/unix/bind_netcat                                               Listen for a connection and spawn a command shell via netcat
cmd/unix/bind_netcat_gaping                                        Listen for a connection and spawn a command shell via netcat
cmd/unix/bind_netcat_gaping_ipv6                                   Listen for a connection and spawn a command shell via netcat
cmd/unix/bind_nodejs                                               Continually listen for a connection and spawn a command shell via nodejs
cmd/unix/bind_perl                                                 Listen for a connection and spawn a command shell via perl
cmd/unix/bind_perl_ipv6                                            Listen for a connection and spawn a command shell via perl
cmd/unix/bind_r                                                    Continually listen for a connection and spawn a command shell via R
cmd/unix/bind_ruby                                                 Continually listen for a connection and spawn a command shell via Ruby
cmd/unix/bind_ruby_ipv6                                            Continually listen for a connection and spawn a command shell via Ruby
cmd/unix/bind_socat_sctp                                           Creates an interactive shell via socat
cmd/unix/bind_socat_udp                                            Creates an interactive shell via socat
cmd/unix/bind_stub                                                 Listen for a connection and spawn a command shell (stub only, no payload)
cmd/unix/bind_zsh                                                  Listen for a connection and spawn a command shell via Zsh. Note: Although Zsh is often available, please be aware it isn't usually installed by default.
cmd/unix/generic                                                   Executes the supplied command
cmd/unix/interact                                                  Interacts with a shell on an established socket connection
cmd/unix/pingback_bind                                             Accept a connection, send a UUID, then exit
cmd/unix/pingback_reverse                                          Creates a socket, send a UUID, then exit
cmd/unix/python/exec                                               Execute a Python payload from a command. Execute an arbitrary OS command. Compatible with Python 2.7 and 3.4+.
cmd/unix/python/meterpreter/bind_tcp                               Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Listen for a connection
cmd/unix/python/meterpreter/bind_tcp_uuid                          Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Listen for a connection with UUID Support
cmd/unix/python/meterpreter/reverse_http                           Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Tunnel communication over HTTP
cmd/unix/python/meterpreter/reverse_https                          Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Tunnel communication over HTTP using SSL
cmd/unix/python/meterpreter/reverse_tcp                            Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Connect back to the attacker
cmd/unix/python/meterpreter/reverse_tcp_ssl                        Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Reverse Python connect back stager using SSL
cmd/unix/python/meterpreter/reverse_tcp_uuid                       Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Connect back to the attacker with UUID Support
cmd/unix/python/meterpreter_bind_tcp                               Execute a Python payload from a command. Connect to the victim and spawn a Meterpreter shell
cmd/unix/python/meterpreter_reverse_http                           Execute a Python payload from a command. Connect back to the attacker and spawn a Meterpreter shell
cmd/unix/python/meterpreter_reverse_https                          Execute a Python payload from a command. Connect back to the attacker and spawn a Meterpreter shell
cmd/unix/python/meterpreter_reverse_tcp                            Execute a Python payload from a command. Connect back to the attacker and spawn a Meterpreter shell
cmd/unix/python/pingback_bind_tcp                                  Execute a Python payload from a command. Listens for a connection from the attacker, sends a UUID, then terminates
cmd/unix/python/pingback_reverse_tcp                               Execute a Python payload from a command. Connects back to the attacker, sends a UUID, then terminates
cmd/unix/python/shell_bind_tcp                                     Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.4-2.7 and 3.4+.
cmd/unix/python/shell_reverse_sctp                                 Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
cmd/unix/python/shell_reverse_tcp                                  Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.4-2.7 and 3.4+.
cmd/unix/python/shell_reverse_tcp_ssl                              Execute a Python payload from a command. Creates an interactive shell via Python, uses SSL, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
cmd/unix/python/shell_reverse_udp                                  Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
cmd/unix/reverse                                                   Creates an interactive shell through two inbound connections
cmd/unix/reverse_awk                                               Creates an interactive shell via GNU AWK
cmd/unix/reverse_bash                                              Creates an interactive shell via bash's builtin /dev/tcp. This will not work on circa 2009 and older Debian-based Linux distributions (including Ubuntu) because they compile bash without the /dev/tcp feature.
cmd/unix/reverse_bash_telnet_ssl                                   Creates an interactive shell via mkfifo and telnet. This method works on Debian and other systems compiled without /dev/tcp support. This module uses the '-z' option included on some systems to encrypt using SSL.
cmd/unix/reverse_bash_udp                                          Creates an interactive shell via bash's builtin /dev/udp. This will not work on circa 2009 and older Debian-based Linux distributions (including Ubuntu) because they compile bash without the /dev/udp feature.
cmd/unix/reverse_jjs                                               Connect back and create a command shell via jjs
cmd/unix/reverse_ksh                                               Connect back and create a command shell via Ksh. Note: Although Ksh is often available, please be aware it isn't usually installed by default.
cmd/unix/reverse_lua                                               Creates an interactive shell via Lua
cmd/unix/reverse_ncat_ssl                                          Creates an interactive shell via ncat, utilizing ssl mode
cmd/unix/reverse_netcat                                            Creates an interactive shell via netcat
cmd/unix/reverse_netcat_gaping                                     Creates an interactive shell via netcat
cmd/unix/reverse_nodejs                                            Continually listen for a connection and spawn a command shell via nodejs
cmd/unix/reverse_openssl                                           Creates an interactive shell through two inbound connections
cmd/unix/reverse_perl                                              Creates an interactive shell via perl
cmd/unix/reverse_perl_ssl                                          Creates an interactive shell via perl, uses SSL
cmd/unix/reverse_php_ssl                                           Creates an interactive shell via php, uses SSL
cmd/unix/reverse_python                                            Connect back and create a command shell via Python
cmd/unix/reverse_python_ssl                                        Creates an interactive shell via python, uses SSL, encodes with base64 by design.
cmd/unix/reverse_r                                                 Connect back and create a command shell via R
cmd/unix/reverse_ruby                                              Connect back and create a command shell via Ruby
cmd/unix/reverse_ruby_ssl                                          Connect back and create a command shell via Ruby, uses SSL
cmd/unix/reverse_socat_sctp                                        Creates an interactive shell via socat
cmd/unix/reverse_socat_tcp                                         Creates an interactive shell via socat
cmd/unix/reverse_socat_udp                                         Creates an interactive shell via socat
cmd/unix/reverse_ssh                                               Connect back and create a command shell via SSH
cmd/unix/reverse_ssl_double_telnet                                 Creates an interactive shell through two inbound connections, encrypts using SSL via "-z" option
cmd/unix/reverse_stub                                              Creates an interactive shell through an inbound connection (stub only, no payload)
cmd/unix/reverse_tclsh                                             Creates an interactive shell via Tclsh
cmd/unix/reverse_zsh                                               Connect back and create a command shell via Zsh. Note: Although Zsh is often available, please be aware it isn't usually installed by default.
cmd/windows/adduser                                                Create a new user and add them to local administration group. Note: The specified password is checked for common complexity requirements to prevent the target machine rejecting the user for failing to meet policy requirements. Complexity check: 8-14 chars (1 UPPER, 1 lower, 1 digit/special)
cmd/windows/bind_lua                                               Listen for a connection and spawn a command shell via Lua
cmd/windows/bind_perl                                              Listen for a connection and spawn a command shell via perl (persistent)
cmd/windows/bind_perl_ipv6                                         Listen for a connection and spawn a command shell via perl (persistent)
cmd/windows/bind_ruby                                              Continually listen for a connection and spawn a command shell via Ruby
cmd/windows/download_eval_vbs                                      Downloads a file from an HTTP(S) URL and executes it as a vbs script. Use it to stage a vbs encoded payload from a short command line.
cmd/windows/download_exec_vbs                                      Download an EXE from an HTTP(S) URL and execute it
cmd/windows/generic                                                Executes the supplied command
cmd/windows/http/x64/custom/bind_ipv6_tcp                          Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Listen for an IPv6 connection (Windows x64)
cmd/windows/http/x64/custom/bind_ipv6_tcp_uuid                     Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/http/x64/custom/bind_named_pipe                        Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Listen for a pipe connection (Windows x64)
cmd/windows/http/x64/custom/bind_tcp                               Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Listen for a connection (Windows x64)
cmd/windows/http/x64/custom/bind_tcp_rc4                           Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Connect back to the attacker
cmd/windows/http/x64/custom/bind_tcp_uuid                          Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Listen for a connection with UUID Support (Windows x64)
cmd/windows/http/x64/custom/reverse_http                           Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/http/x64/custom/reverse_https                          Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/http/x64/custom/reverse_named_pipe                     Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Connect back to the attacker via a named pipe pivot
cmd/windows/http/x64/custom/reverse_tcp                            Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Connect back to the attacker (Windows x64)
cmd/windows/http/x64/custom/reverse_tcp_rc4                        Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Connect back to the attacker
cmd/windows/http/x64/custom/reverse_tcp_uuid                       Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/http/x64/custom/reverse_winhttp                        Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/http/x64/custom/reverse_winhttps                       Fetch and execute an x64 payload from an HTTP server. Custom shellcode stage. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/http/x64/encrypted_shell/reverse_tcp                   Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (staged). Connect to MSF and read in stage
cmd/windows/http/x64/encrypted_shell_reverse_tcp                   Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn an encrypted command shell
cmd/windows/http/x64/exec                                          Fetch and execute an x64 payload from an HTTP server. Execute an arbitrary command (Windows x64)
cmd/windows/http/x64/loadlibrary                                   Fetch and execute an x64 payload from an HTTP server. Load an arbitrary x64 library path
cmd/windows/http/x64/messagebox                                    Fetch and execute an x64 payload from an HTTP server. Spawn a dialog via MessageBox using a customizable title, text & icon
cmd/windows/http/x64/meterpreter/bind_ipv6_tcp                     Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection (Windows x64)
cmd/windows/http/x64/meterpreter/bind_ipv6_tcp_uuid                Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/http/x64/meterpreter/bind_named_pipe                   Fetch and execute an x64 payload from an HTTP server. Listen for a pipe connection (Windows x64)
cmd/windows/http/x64/meterpreter/bind_tcp                          Fetch and execute an x64 payload from an HTTP server. Listen for a connection (Windows x64)
cmd/windows/http/x64/meterpreter/bind_tcp_rc4                      Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/windows/http/x64/meterpreter/bind_tcp_uuid                     Fetch and execute an x64 payload from an HTTP server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/http/x64/meterpreter/reverse_http                      Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/http/x64/meterpreter/reverse_https                     Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/http/x64/meterpreter/reverse_named_pipe                Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker via a named pipe pivot
cmd/windows/http/x64/meterpreter/reverse_tcp                       Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker (Windows x64)
cmd/windows/http/x64/meterpreter/reverse_tcp_rc4                   Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/windows/http/x64/meterpreter/reverse_tcp_uuid                  Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/http/x64/meterpreter/reverse_winhttp                   Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/http/x64/meterpreter/reverse_winhttps                  Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/http/x64/meterpreter_bind_named_pipe                   Fetch and execute an x64 payload from an HTTP server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/http/x64/meterpreter_bind_tcp                          Fetch and execute an x64 payload from an HTTP server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/http/x64/meterpreter_reverse_http                      Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/http/x64/meterpreter_reverse_https                     Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/http/x64/meterpreter_reverse_ipv6_tcp                  Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/http/x64/meterpreter_reverse_tcp                       Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/http/x64/peinject/bind_ipv6_tcp                        Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection (Windows x64)
cmd/windows/http/x64/peinject/bind_ipv6_tcp_uuid                   Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/http/x64/peinject/bind_named_pipe                      Fetch and execute an x64 payload from an HTTP server. Listen for a pipe connection (Windows x64)
cmd/windows/http/x64/peinject/bind_tcp                             Fetch and execute an x64 payload from an HTTP server. Listen for a connection (Windows x64)
cmd/windows/http/x64/peinject/bind_tcp_rc4                         Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/windows/http/x64/peinject/bind_tcp_uuid                        Fetch and execute an x64 payload from an HTTP server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/http/x64/peinject/reverse_named_pipe                   Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker via a named pipe pivot
cmd/windows/http/x64/peinject/reverse_tcp                          Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker (Windows x64)
cmd/windows/http/x64/peinject/reverse_tcp_rc4                      Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/windows/http/x64/peinject/reverse_tcp_uuid                     Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/http/x64/pingback_reverse_tcp                          Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and report UUID (Windows x64)
cmd/windows/http/x64/powershell_bind_tcp                           Fetch and execute an x64 payload from an HTTP server.
cmd/windows/http/x64/powershell_reverse_tcp                        Fetch and execute an x64 payload from an HTTP server.
cmd/windows/http/x64/powershell_reverse_tcp_ssl                    Fetch and execute an x64 payload from an HTTP server.
cmd/windows/http/x64/shell/bind_ipv6_tcp                           Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
cmd/windows/http/x64/shell/bind_ipv6_tcp_uuid                      Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/http/x64/shell/bind_named_pipe                         Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Listen for a pipe connection (Windows x64)
cmd/windows/http/x64/shell/bind_tcp                                Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection (Windows x64)
cmd/windows/http/x64/shell/bind_tcp_rc4                            Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/http/x64/shell/bind_tcp_uuid                           Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
cmd/windows/http/x64/shell/reverse_tcp                             Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker (Windows x64)
cmd/windows/http/x64/shell/reverse_tcp_rc4                         Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/http/x64/shell/reverse_tcp_uuid                        Fetch and execute an x64 payload from an HTTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/http/x64/shell_bind_tcp                                Fetch and execute an x64 payload from an HTTP server. Listen for a connection and spawn a command shell (Windows x64)
cmd/windows/http/x64/shell_reverse_tcp                             Fetch and execute an x64 payload from an HTTP server. Connect back to attacker and spawn a command shell (Windows x64)
cmd/windows/http/x64/vncinject/bind_ipv6_tcp                       Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection (Windows x64)
cmd/windows/http/x64/vncinject/bind_ipv6_tcp_uuid                  Fetch and execute an x64 payload from an HTTP server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/http/x64/vncinject/bind_named_pipe                     Fetch and execute an x64 payload from an HTTP server. Listen for a pipe connection (Windows x64)
cmd/windows/http/x64/vncinject/bind_tcp                            Fetch and execute an x64 payload from an HTTP server. Listen for a connection (Windows x64)
cmd/windows/http/x64/vncinject/bind_tcp_rc4                        Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/windows/http/x64/vncinject/bind_tcp_uuid                       Fetch and execute an x64 payload from an HTTP server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/http/x64/vncinject/reverse_http                        Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/http/x64/vncinject/reverse_https                       Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/http/x64/vncinject/reverse_tcp                         Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker (Windows x64)
cmd/windows/http/x64/vncinject/reverse_tcp_rc4                     Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker
cmd/windows/http/x64/vncinject/reverse_tcp_uuid                    Fetch and execute an x64 payload from an HTTP server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/http/x64/vncinject/reverse_winhttp                     Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/http/x64/vncinject/reverse_winhttps                    Fetch and execute an x64 payload from an HTTP server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/https/x64/custom/bind_ipv6_tcp                         Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Listen for an IPv6 connection (Windows x64)
cmd/windows/https/x64/custom/bind_ipv6_tcp_uuid                    Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/https/x64/custom/bind_named_pipe                       Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Listen for a pipe connection (Windows x64)
cmd/windows/https/x64/custom/bind_tcp                              Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Listen for a connection (Windows x64)
cmd/windows/https/x64/custom/bind_tcp_rc4                          Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Connect back to the attacker
cmd/windows/https/x64/custom/bind_tcp_uuid                         Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Listen for a connection with UUID Support (Windows x64)
cmd/windows/https/x64/custom/reverse_http                          Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/https/x64/custom/reverse_https                         Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/https/x64/custom/reverse_named_pipe                    Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Connect back to the attacker via a named pipe pivot
cmd/windows/https/x64/custom/reverse_tcp                           Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Connect back to the attacker (Windows x64)
cmd/windows/https/x64/custom/reverse_tcp_rc4                       Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Connect back to the attacker
cmd/windows/https/x64/custom/reverse_tcp_uuid                      Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/https/x64/custom/reverse_winhttp                       Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/https/x64/custom/reverse_winhttps                      Fetch and execute an x64 payload from an HTTPS server. Custom shellcode stage. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/https/x64/encrypted_shell/reverse_tcp                  Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (staged). Connect to MSF and read in stage
cmd/windows/https/x64/encrypted_shell_reverse_tcp                  Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn an encrypted command shell
cmd/windows/https/x64/exec                                         Fetch and execute an x64 payload from an HTTPS server. Execute an arbitrary command (Windows x64)
cmd/windows/https/x64/loadlibrary                                  Fetch and execute an x64 payload from an HTTPS server. Load an arbitrary x64 library path
cmd/windows/https/x64/messagebox                                   Fetch and execute an x64 payload from an HTTPS server. Spawn a dialog via MessageBox using a customizable title, text & icon
cmd/windows/https/x64/meterpreter/bind_ipv6_tcp                    Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection (Windows x64)
cmd/windows/https/x64/meterpreter/bind_ipv6_tcp_uuid               Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/https/x64/meterpreter/bind_named_pipe                  Fetch and execute an x64 payload from an HTTPS server. Listen for a pipe connection (Windows x64)
cmd/windows/https/x64/meterpreter/bind_tcp                         Fetch and execute an x64 payload from an HTTPS server. Listen for a connection (Windows x64)
cmd/windows/https/x64/meterpreter/bind_tcp_rc4                     Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/windows/https/x64/meterpreter/bind_tcp_uuid                    Fetch and execute an x64 payload from an HTTPS server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/https/x64/meterpreter/reverse_http                     Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/https/x64/meterpreter/reverse_https                    Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/https/x64/meterpreter/reverse_named_pipe               Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker via a named pipe pivot
cmd/windows/https/x64/meterpreter/reverse_tcp                      Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker (Windows x64)
cmd/windows/https/x64/meterpreter/reverse_tcp_rc4                  Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/windows/https/x64/meterpreter/reverse_tcp_uuid                 Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/https/x64/meterpreter/reverse_winhttp                  Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/https/x64/meterpreter/reverse_winhttps                 Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/https/x64/meterpreter_bind_named_pipe                  Fetch and execute an x64 payload from an HTTPS server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/https/x64/meterpreter_bind_tcp                         Fetch and execute an x64 payload from an HTTPS server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/https/x64/meterpreter_reverse_http                     Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/https/x64/meterpreter_reverse_https                    Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/https/x64/meterpreter_reverse_ipv6_tcp                 Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/https/x64/meterpreter_reverse_tcp                      Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/https/x64/peinject/bind_ipv6_tcp                       Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection (Windows x64)
cmd/windows/https/x64/peinject/bind_ipv6_tcp_uuid                  Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/https/x64/peinject/bind_named_pipe                     Fetch and execute an x64 payload from an HTTPS server. Listen for a pipe connection (Windows x64)
cmd/windows/https/x64/peinject/bind_tcp                            Fetch and execute an x64 payload from an HTTPS server. Listen for a connection (Windows x64)
cmd/windows/https/x64/peinject/bind_tcp_rc4                        Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/windows/https/x64/peinject/bind_tcp_uuid                       Fetch and execute an x64 payload from an HTTPS server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/https/x64/peinject/reverse_named_pipe                  Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker via a named pipe pivot
cmd/windows/https/x64/peinject/reverse_tcp                         Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker (Windows x64)
cmd/windows/https/x64/peinject/reverse_tcp_rc4                     Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/windows/https/x64/peinject/reverse_tcp_uuid                    Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/https/x64/pingback_reverse_tcp                         Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and report UUID (Windows x64)
cmd/windows/https/x64/powershell_bind_tcp                          Fetch and execute an x64 payload from an HTTPS server.
cmd/windows/https/x64/powershell_reverse_tcp                       Fetch and execute an x64 payload from an HTTPS server.
cmd/windows/https/x64/powershell_reverse_tcp_ssl                   Fetch and execute an x64 payload from an HTTPS server.
cmd/windows/https/x64/shell/bind_ipv6_tcp                          Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
cmd/windows/https/x64/shell/bind_ipv6_tcp_uuid                     Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/https/x64/shell/bind_named_pipe                        Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Listen for a pipe connection (Windows x64)
cmd/windows/https/x64/shell/bind_tcp                               Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection (Windows x64)
cmd/windows/https/x64/shell/bind_tcp_rc4                           Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/https/x64/shell/bind_tcp_uuid                          Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
cmd/windows/https/x64/shell/reverse_tcp                            Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker (Windows x64)
cmd/windows/https/x64/shell/reverse_tcp_rc4                        Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/https/x64/shell/reverse_tcp_uuid                       Fetch and execute an x64 payload from an HTTPS server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/https/x64/shell_bind_tcp                               Fetch and execute an x64 payload from an HTTPS server. Listen for a connection and spawn a command shell (Windows x64)
cmd/windows/https/x64/shell_reverse_tcp                            Fetch and execute an x64 payload from an HTTPS server. Connect back to attacker and spawn a command shell (Windows x64)
cmd/windows/https/x64/vncinject/bind_ipv6_tcp                      Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection (Windows x64)
cmd/windows/https/x64/vncinject/bind_ipv6_tcp_uuid                 Fetch and execute an x64 payload from an HTTPS server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/https/x64/vncinject/bind_named_pipe                    Fetch and execute an x64 payload from an HTTPS server. Listen for a pipe connection (Windows x64)
cmd/windows/https/x64/vncinject/bind_tcp                           Fetch and execute an x64 payload from an HTTPS server. Listen for a connection (Windows x64)
cmd/windows/https/x64/vncinject/bind_tcp_rc4                       Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/windows/https/x64/vncinject/bind_tcp_uuid                      Fetch and execute an x64 payload from an HTTPS server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/https/x64/vncinject/reverse_http                       Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/https/x64/vncinject/reverse_https                      Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/https/x64/vncinject/reverse_tcp                        Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker (Windows x64)
cmd/windows/https/x64/vncinject/reverse_tcp_rc4                    Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker
cmd/windows/https/x64/vncinject/reverse_tcp_uuid                   Fetch and execute an x64 payload from an HTTPS server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/https/x64/vncinject/reverse_winhttp                    Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/https/x64/vncinject/reverse_winhttps                   Fetch and execute an x64 payload from an HTTPS server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/jjs_reverse_tcp                                        Connect back and create a command shell via jjs
cmd/windows/powershell/adduser                                     Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/custom/bind_hidden_ipknock_tcp              Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/custom/bind_hidden_tcp                      Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/custom/bind_ipv6_tcp                        Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/custom/bind_ipv6_tcp_uuid                   Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/custom/bind_named_pipe                      Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/custom/bind_nonx_tcp                        Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection (No NX)
cmd/windows/powershell/custom/bind_tcp                             Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection (Windows x86)
cmd/windows/powershell/custom/bind_tcp_rc4                         Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection
cmd/windows/powershell/custom/bind_tcp_uuid                        Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/custom/find_tag                             Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Use an established connection
cmd/windows/powershell/custom/reverse_http                         Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTP (Windows wininet)
cmd/windows/powershell/custom/reverse_http_proxy_pstore            Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTP
cmd/windows/powershell/custom/reverse_https                        Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTPS (Windows wininet)
cmd/windows/powershell/custom/reverse_ipv6_tcp                     Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker over IPv6
cmd/windows/powershell/custom/reverse_named_pipe                   Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker via a named pipe pivot
cmd/windows/powershell/custom/reverse_nonx_tcp                     Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker (No NX)
cmd/windows/powershell/custom/reverse_ord_tcp                      Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/custom/reverse_tcp                          Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/custom/reverse_tcp_allports                 Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/custom/reverse_tcp_dns                      Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/custom/reverse_tcp_rc4                      Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/custom/reverse_tcp_rc4_dns                  Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/custom/reverse_tcp_uuid                     Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker with UUID Support
cmd/windows/powershell/custom/reverse_udp                          Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker with UUID Support
cmd/windows/powershell/custom/reverse_winhttp                      Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTP (Windows winhttp)
cmd/windows/powershell/custom/reverse_winhttps                     Execute an x86 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTPS (Windows winhttp)
cmd/windows/powershell/dllinject/bind_hidden_ipknock_tcp           Execute an x86 payload from a command via PowerShell. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/dllinject/bind_hidden_tcp                   Execute an x86 payload from a command via PowerShell. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/dllinject/bind_ipv6_tcp                     Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/dllinject/bind_ipv6_tcp_uuid                Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/dllinject/bind_named_pipe                   Execute an x86 payload from a command via PowerShell. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/dllinject/bind_nonx_tcp                     Execute an x86 payload from a command via PowerShell. Listen for a connection (No NX)
cmd/windows/powershell/dllinject/bind_tcp                          Execute an x86 payload from a command via PowerShell. Listen for a connection (Windows x86)
cmd/windows/powershell/dllinject/bind_tcp_rc4                      Execute an x86 payload from a command via PowerShell. Listen for a connection
cmd/windows/powershell/dllinject/bind_tcp_uuid                     Execute an x86 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/dllinject/find_tag                          Execute an x86 payload from a command via PowerShell. Use an established connection
cmd/windows/powershell/dllinject/reverse_http                      Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP (Windows wininet)
cmd/windows/powershell/dllinject/reverse_http_proxy_pstore         Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP
cmd/windows/powershell/dllinject/reverse_ipv6_tcp                  Execute an x86 payload from a command via PowerShell. Connect back to the attacker over IPv6
cmd/windows/powershell/dllinject/reverse_nonx_tcp                  Execute an x86 payload from a command via PowerShell. Connect back to the attacker (No NX)
cmd/windows/powershell/dllinject/reverse_ord_tcp                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/dllinject/reverse_tcp                       Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/dllinject/reverse_tcp_allports              Execute an x86 payload from a command via PowerShell. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/dllinject/reverse_tcp_dns                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/dllinject/reverse_tcp_rc4                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/dllinject/reverse_tcp_rc4_dns               Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/dllinject/reverse_tcp_uuid                  Execute an x86 payload from a command via PowerShell. Connect back to the attacker with UUID Support
cmd/windows/powershell/dllinject/reverse_winhttp                   Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP (Windows winhttp)
cmd/windows/powershell/dns_txt_query_exec                          Execute an x86 payload from a command via PowerShell. Performs a TXT query against a series of DNS record(s) and executes the returned x86 shellcode. The DNSZONE option is used as the base name to iterate over. The payload will first request the TXT contents of the a hostname, followed by b, then c, etc. until there are no more records. For each record that is returned, exactly 255 bytes from it are copied into a buffer that is eventually executed. This buffer should be encoded using x86/alpha_mixed with the BufferRegister option set to EDI.
cmd/windows/powershell/download_exec                               Execute an x86 payload from a command via PowerShell. Download an EXE from an HTTP(S)/FTP URL and execute it
cmd/windows/powershell/exec                                        Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/format_all_drives                           Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/generic/debug_trap                          Execute an x86 payload from a command via PowerShell. Generate a debug trap in the target process
cmd/windows/powershell/generic/tight_loop                          Execute an x86 payload from a command via PowerShell. Generate a tight loop in the target process
cmd/windows/powershell/loadlibrary                                 Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/messagebox                                  Execute an x86 payload from a command via PowerShell. Spawns a dialog via MessageBox using a customizable title, text & icon
cmd/windows/powershell/meterpreter/bind_hidden_ipknock_tcp         Execute an x86 payload from a command via PowerShell. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/meterpreter/bind_hidden_tcp                 Execute an x86 payload from a command via PowerShell. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/meterpreter/bind_ipv6_tcp                   Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/meterpreter/bind_ipv6_tcp_uuid              Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/meterpreter/bind_named_pipe                 Execute an x86 payload from a command via PowerShell. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/meterpreter/bind_nonx_tcp                   Execute an x86 payload from a command via PowerShell. Listen for a connection (No NX)
cmd/windows/powershell/meterpreter/bind_tcp                        Execute an x86 payload from a command via PowerShell. Listen for a connection (Windows x86)
cmd/windows/powershell/meterpreter/bind_tcp_rc4                    Execute an x86 payload from a command via PowerShell. Listen for a connection
cmd/windows/powershell/meterpreter/bind_tcp_uuid                   Execute an x86 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/meterpreter/find_tag                        Execute an x86 payload from a command via PowerShell. Use an established connection
cmd/windows/powershell/meterpreter/reverse_http                    Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP (Windows wininet)
cmd/windows/powershell/meterpreter/reverse_http_proxy_pstore       Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP
cmd/windows/powershell/meterpreter/reverse_https                   Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTPS (Windows wininet)
cmd/windows/powershell/meterpreter/reverse_ipv6_tcp                Execute an x86 payload from a command via PowerShell. Connect back to the attacker over IPv6
cmd/windows/powershell/meterpreter/reverse_named_pipe              Execute an x86 payload from a command via PowerShell. Connect back to the attacker via a named pipe pivot
cmd/windows/powershell/meterpreter/reverse_nonx_tcp                Execute an x86 payload from a command via PowerShell. Connect back to the attacker (No NX)
cmd/windows/powershell/meterpreter/reverse_ord_tcp                 Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/meterpreter/reverse_tcp                     Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/meterpreter/reverse_tcp_allports            Execute an x86 payload from a command via PowerShell. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/meterpreter/reverse_tcp_dns                 Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/meterpreter/reverse_tcp_rc4                 Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/meterpreter/reverse_tcp_rc4_dns             Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/meterpreter/reverse_tcp_uuid                Execute an x86 payload from a command via PowerShell. Connect back to the attacker with UUID Support
cmd/windows/powershell/meterpreter/reverse_winhttp                 Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP (Windows winhttp)
cmd/windows/powershell/meterpreter/reverse_winhttps                Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTPS (Windows winhttp)
cmd/windows/powershell/metsvc_bind_tcp                             Execute an x86 payload from a command via PowerShell. Stub payload for interacting with a Meterpreter Service
cmd/windows/powershell/metsvc_reverse_tcp                          Execute an x86 payload from a command via PowerShell. Stub payload for interacting with a Meterpreter Service
cmd/windows/powershell/patchupdllinject/bind_hidden_ipknock_tcp    Execute an x86 payload from a command via PowerShell. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/patchupdllinject/bind_hidden_tcp            Execute an x86 payload from a command via PowerShell. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/patchupdllinject/bind_ipv6_tcp              Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/patchupdllinject/bind_ipv6_tcp_uuid         Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/patchupdllinject/bind_named_pipe            Execute an x86 payload from a command via PowerShell. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/patchupdllinject/bind_nonx_tcp              Execute an x86 payload from a command via PowerShell. Listen for a connection (No NX)
cmd/windows/powershell/patchupdllinject/bind_tcp                   Execute an x86 payload from a command via PowerShell. Listen for a connection (Windows x86)
cmd/windows/powershell/patchupdllinject/bind_tcp_rc4               Execute an x86 payload from a command via PowerShell. Listen for a connection
cmd/windows/powershell/patchupdllinject/bind_tcp_uuid              Execute an x86 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/patchupdllinject/find_tag                   Execute an x86 payload from a command via PowerShell. Use an established connection
cmd/windows/powershell/patchupdllinject/reverse_ipv6_tcp           Execute an x86 payload from a command via PowerShell. Connect back to the attacker over IPv6
cmd/windows/powershell/patchupdllinject/reverse_nonx_tcp           Execute an x86 payload from a command via PowerShell. Connect back to the attacker (No NX)
cmd/windows/powershell/patchupdllinject/reverse_ord_tcp            Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupdllinject/reverse_tcp                Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupdllinject/reverse_tcp_allports       Execute an x86 payload from a command via PowerShell. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/patchupdllinject/reverse_tcp_dns            Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupdllinject/reverse_tcp_rc4            Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupdllinject/reverse_tcp_rc4_dns        Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupdllinject/reverse_tcp_uuid           Execute an x86 payload from a command via PowerShell. Connect back to the attacker with UUID Support
cmd/windows/powershell/patchupmeterpreter/bind_hidden_ipknock_tcp  Execute an x86 payload from a command via PowerShell. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/patchupmeterpreter/bind_hidden_tcp          Execute an x86 payload from a command via PowerShell. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/patchupmeterpreter/bind_ipv6_tcp            Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/patchupmeterpreter/bind_ipv6_tcp_uuid       Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/patchupmeterpreter/bind_named_pipe          Execute an x86 payload from a command via PowerShell. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/patchupmeterpreter/bind_nonx_tcp            Execute an x86 payload from a command via PowerShell. Listen for a connection (No NX)
cmd/windows/powershell/patchupmeterpreter/bind_tcp                 Execute an x86 payload from a command via PowerShell. Listen for a connection (Windows x86)
cmd/windows/powershell/patchupmeterpreter/bind_tcp_rc4             Execute an x86 payload from a command via PowerShell. Listen for a connection
cmd/windows/powershell/patchupmeterpreter/bind_tcp_uuid            Execute an x86 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/patchupmeterpreter/find_tag                 Execute an x86 payload from a command via PowerShell. Use an established connection
cmd/windows/powershell/patchupmeterpreter/reverse_ipv6_tcp         Execute an x86 payload from a command via PowerShell. Connect back to the attacker over IPv6
cmd/windows/powershell/patchupmeterpreter/reverse_nonx_tcp         Execute an x86 payload from a command via PowerShell. Connect back to the attacker (No NX)
cmd/windows/powershell/patchupmeterpreter/reverse_ord_tcp          Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupmeterpreter/reverse_tcp              Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupmeterpreter/reverse_tcp_allports     Execute an x86 payload from a command via PowerShell. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/patchupmeterpreter/reverse_tcp_dns          Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupmeterpreter/reverse_tcp_rc4          Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupmeterpreter/reverse_tcp_rc4_dns      Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/patchupmeterpreter/reverse_tcp_uuid         Execute an x86 payload from a command via PowerShell. Connect back to the attacker with UUID Support
cmd/windows/powershell/peinject/bind_hidden_ipknock_tcp            Execute an x86 payload from a command via PowerShell. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/peinject/bind_hidden_tcp                    Execute an x86 payload from a command via PowerShell. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/peinject/bind_ipv6_tcp                      Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/peinject/bind_ipv6_tcp_uuid                 Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/peinject/bind_named_pipe                    Execute an x86 payload from a command via PowerShell. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/peinject/bind_nonx_tcp                      Execute an x86 payload from a command via PowerShell. Listen for a connection (No NX)
cmd/windows/powershell/peinject/bind_tcp                           Execute an x86 payload from a command via PowerShell. Listen for a connection (Windows x86)
cmd/windows/powershell/peinject/bind_tcp_rc4                       Execute an x86 payload from a command via PowerShell. Listen for a connection
cmd/windows/powershell/peinject/bind_tcp_uuid                      Execute an x86 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/peinject/find_tag                           Execute an x86 payload from a command via PowerShell. Use an established connection
cmd/windows/powershell/peinject/reverse_ipv6_tcp                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker over IPv6
cmd/windows/powershell/peinject/reverse_named_pipe                 Execute an x86 payload from a command via PowerShell. Connect back to the attacker via a named pipe pivot
cmd/windows/powershell/peinject/reverse_nonx_tcp                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker (No NX)
cmd/windows/powershell/peinject/reverse_ord_tcp                    Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/peinject/reverse_tcp                        Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/peinject/reverse_tcp_allports               Execute an x86 payload from a command via PowerShell. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/peinject/reverse_tcp_dns                    Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/peinject/reverse_tcp_rc4                    Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/peinject/reverse_tcp_rc4_dns                Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/peinject/reverse_tcp_uuid                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker with UUID Support
cmd/windows/powershell/pingback_bind_tcp                           Execute an x86 payload from a command via PowerShell. Open a socket and report UUID when a connection is received (Windows x86)
cmd/windows/powershell/pingback_reverse_tcp                        Execute an x86 payload from a command via PowerShell. Connect back to attacker and report UUID (Windows x86)
cmd/windows/powershell/powershell_bind_tcp                         Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/powershell_reverse_tcp                      Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/powershell_reverse_tcp_ssl                  Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/shell/bind_hidden_ipknock_tcp               Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/shell/bind_hidden_tcp                       Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/shell/bind_ipv6_tcp                         Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/shell/bind_ipv6_tcp_uuid                    Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/shell/bind_named_pipe                       Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a pipe connection (Windows x86)
cmd/windows/powershell/shell/bind_nonx_tcp                         Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a connection (No NX)
cmd/windows/powershell/shell/bind_tcp                              Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a connection (Windows x86)
cmd/windows/powershell/shell/bind_tcp_rc4                          Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a connection
cmd/windows/powershell/shell/bind_tcp_uuid                         Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/shell/find_tag                              Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Use an established connection
cmd/windows/powershell/shell/reverse_ipv6_tcp                      Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker over IPv6
cmd/windows/powershell/shell/reverse_nonx_tcp                      Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker (No NX)
cmd/windows/powershell/shell/reverse_ord_tcp                       Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker
cmd/windows/powershell/shell/reverse_tcp                           Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker
cmd/windows/powershell/shell/reverse_tcp_allports                  Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/shell/reverse_tcp_dns                       Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker
cmd/windows/powershell/shell/reverse_tcp_rc4                       Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker
cmd/windows/powershell/shell/reverse_tcp_rc4_dns                   Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker
cmd/windows/powershell/shell/reverse_tcp_uuid                      Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker with UUID Support
cmd/windows/powershell/shell/reverse_udp                           Execute an x86 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect back to the attacker with UUID Support
cmd/windows/powershell/shell_bind_tcp                              Execute an x86 payload from a command via PowerShell. Listen for a connection and spawn a command shell
cmd/windows/powershell/shell_bind_tcp_xpfw                         Execute an x86 payload from a command via PowerShell. Disable the Windows ICF, then listen for a connection and spawn a command shell
cmd/windows/powershell/shell_hidden_bind_tcp                       Execute an x86 payload from a command via PowerShell. Listen for a connection from certain IP and spawn a command shell. The shellcode will reply with a RST packet if the connections is not coming from the IP defined in AHOST. This way the port will appear as "closed" helping us to hide the shellcode.
cmd/windows/powershell/shell_reverse_tcp                           Execute an x86 payload from a command via PowerShell. Connect back to attacker and spawn a command shell
cmd/windows/powershell/speak_pwned                                 Execute an x86 payload from a command via PowerShell
cmd/windows/powershell/upexec/bind_hidden_ipknock_tcp              Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/upexec/bind_hidden_tcp                      Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/upexec/bind_ipv6_tcp                        Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/upexec/bind_ipv6_tcp_uuid                   Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/upexec/bind_named_pipe                      Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a pipe connection (Windows x86)
cmd/windows/powershell/upexec/bind_nonx_tcp                        Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a connection (No NX)
cmd/windows/powershell/upexec/bind_tcp                             Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a connection (Windows x86)
cmd/windows/powershell/upexec/bind_tcp_rc4                         Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a connection
cmd/windows/powershell/upexec/bind_tcp_uuid                        Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/upexec/find_tag                             Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Use an established connection
cmd/windows/powershell/upexec/reverse_ipv6_tcp                     Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker over IPv6
cmd/windows/powershell/upexec/reverse_nonx_tcp                     Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker (No NX)
cmd/windows/powershell/upexec/reverse_ord_tcp                      Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker
cmd/windows/powershell/upexec/reverse_tcp                          Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker
cmd/windows/powershell/upexec/reverse_tcp_allports                 Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/upexec/reverse_tcp_dns                      Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker
cmd/windows/powershell/upexec/reverse_tcp_rc4                      Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker
cmd/windows/powershell/upexec/reverse_tcp_rc4_dns                  Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker
cmd/windows/powershell/upexec/reverse_tcp_uuid                     Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker with UUID Support
cmd/windows/powershell/upexec/reverse_udp                          Execute an x86 payload from a command via PowerShell. Uploads an executable and runs it (staged). Connect back to the attacker with UUID Support
cmd/windows/powershell/vncinject/bind_hidden_ipknock_tcp           Execute an x86 payload from a command via PowerShell. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
cmd/windows/powershell/vncinject/bind_hidden_tcp                   Execute an x86 payload from a command via PowerShell. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
cmd/windows/powershell/vncinject/bind_ipv6_tcp                     Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x86)
cmd/windows/powershell/vncinject/bind_ipv6_tcp_uuid                Execute an x86 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x86)
cmd/windows/powershell/vncinject/bind_named_pipe                   Execute an x86 payload from a command via PowerShell. Listen for a pipe connection (Windows x86)
cmd/windows/powershell/vncinject/bind_nonx_tcp                     Execute an x86 payload from a command via PowerShell. Listen for a connection (No NX)
cmd/windows/powershell/vncinject/bind_tcp                          Execute an x86 payload from a command via PowerShell. Listen for a connection (Windows x86)
cmd/windows/powershell/vncinject/bind_tcp_rc4                      Execute an x86 payload from a command via PowerShell. Listen for a connection
cmd/windows/powershell/vncinject/bind_tcp_uuid                     Execute an x86 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x86)
cmd/windows/powershell/vncinject/find_tag                          Execute an x86 payload from a command via PowerShell. Use an established connection
cmd/windows/powershell/vncinject/reverse_http                      Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP (Windows wininet)
cmd/windows/powershell/vncinject/reverse_http_proxy_pstore         Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP
cmd/windows/powershell/vncinject/reverse_ipv6_tcp                  Execute an x86 payload from a command via PowerShell. Connect back to the attacker over IPv6
cmd/windows/powershell/vncinject/reverse_nonx_tcp                  Execute an x86 payload from a command via PowerShell. Connect back to the attacker (No NX)
cmd/windows/powershell/vncinject/reverse_ord_tcp                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/vncinject/reverse_tcp                       Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/vncinject/reverse_tcp_allports              Execute an x86 payload from a command via PowerShell. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
cmd/windows/powershell/vncinject/reverse_tcp_dns                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/vncinject/reverse_tcp_rc4                   Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/vncinject/reverse_tcp_rc4_dns               Execute an x86 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/vncinject/reverse_tcp_uuid                  Execute an x86 payload from a command via PowerShell. Connect back to the attacker with UUID Support
cmd/windows/powershell/vncinject/reverse_winhttp                   Execute an x86 payload from a command via PowerShell. Tunnel communication over HTTP (Windows winhttp)
cmd/windows/powershell/x64/custom/bind_ipv6_tcp                    Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Listen for an IPv6 connection (Windows x64)
cmd/windows/powershell/x64/custom/bind_ipv6_tcp_uuid               Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/custom/bind_named_pipe                  Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Listen for a pipe connection (Windows x64)
cmd/windows/powershell/x64/custom/bind_tcp                         Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection (Windows x64)
cmd/windows/powershell/x64/custom/bind_tcp_rc4                     Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/x64/custom/bind_tcp_uuid                    Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Listen for a connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/custom/reverse_http                     Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/powershell/x64/custom/reverse_https                    Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/powershell/x64/custom/reverse_named_pipe               Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker via a named pipe pivot
cmd/windows/powershell/x64/custom/reverse_tcp                      Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker (Windows x64)
cmd/windows/powershell/x64/custom/reverse_tcp_rc4                  Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker
cmd/windows/powershell/x64/custom/reverse_tcp_uuid                 Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/powershell/x64/custom/reverse_winhttp                  Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/powershell/x64/custom/reverse_winhttps                 Execute an x64 payload from a command via PowerShell. Custom shellcode stage. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/powershell/x64/encrypted_shell/reverse_tcp             Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (staged). Connect to MSF and read in stage
cmd/windows/powershell/x64/exec                                    Execute an x64 payload from a command via PowerShell. Execute an arbitrary command (Windows x64)
cmd/windows/powershell/x64/loadlibrary                             Execute an x64 payload from a command via PowerShell. Load an arbitrary x64 library path
cmd/windows/powershell/x64/messagebox                              Execute an x64 payload from a command via PowerShell. Spawn a dialog via MessageBox using a customizable title, text & icon
cmd/windows/powershell/x64/meterpreter/bind_ipv6_tcp               Execute an x64 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x64)
cmd/windows/powershell/x64/meterpreter/bind_ipv6_tcp_uuid          Execute an x64 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/meterpreter/bind_named_pipe             Execute an x64 payload from a command via PowerShell. Listen for a pipe connection (Windows x64)
cmd/windows/powershell/x64/meterpreter/bind_tcp                    Execute an x64 payload from a command via PowerShell. Listen for a connection (Windows x64)
cmd/windows/powershell/x64/meterpreter/bind_tcp_rc4                Execute an x64 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/x64/meterpreter/bind_tcp_uuid               Execute an x64 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/meterpreter/reverse_http                Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/powershell/x64/meterpreter/reverse_https               Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/powershell/x64/meterpreter/reverse_named_pipe          Execute an x64 payload from a command via PowerShell. Connect back to the attacker via a named pipe pivot
cmd/windows/powershell/x64/meterpreter/reverse_tcp                 Execute an x64 payload from a command via PowerShell. Connect back to the attacker (Windows x64)
cmd/windows/powershell/x64/meterpreter/reverse_tcp_rc4             Execute an x64 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/x64/meterpreter/reverse_tcp_uuid            Execute an x64 payload from a command via PowerShell. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/powershell/x64/meterpreter/reverse_winhttp             Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/powershell/x64/meterpreter/reverse_winhttps            Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/powershell/x64/peinject/bind_ipv6_tcp                  Execute an x64 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x64)
cmd/windows/powershell/x64/peinject/bind_ipv6_tcp_uuid             Execute an x64 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/peinject/bind_named_pipe                Execute an x64 payload from a command via PowerShell. Listen for a pipe connection (Windows x64)
cmd/windows/powershell/x64/peinject/bind_tcp                       Execute an x64 payload from a command via PowerShell. Listen for a connection (Windows x64)
cmd/windows/powershell/x64/peinject/bind_tcp_rc4                   Execute an x64 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/x64/peinject/bind_tcp_uuid                  Execute an x64 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/peinject/reverse_named_pipe             Execute an x64 payload from a command via PowerShell. Connect back to the attacker via a named pipe pivot
cmd/windows/powershell/x64/peinject/reverse_tcp                    Execute an x64 payload from a command via PowerShell. Connect back to the attacker (Windows x64)
cmd/windows/powershell/x64/peinject/reverse_tcp_rc4                Execute an x64 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/x64/peinject/reverse_tcp_uuid               Execute an x64 payload from a command via PowerShell. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/powershell/x64/pingback_reverse_tcp                    Execute an x64 payload from a command via PowerShell. Connect back to attacker and report UUID (Windows x64)
cmd/windows/powershell/x64/powershell_bind_tcp                     Execute an x64 payload from a command via PowerShell
cmd/windows/powershell/x64/powershell_reverse_tcp                  Execute an x64 payload from a command via PowerShell
cmd/windows/powershell/x64/powershell_reverse_tcp_ssl              Execute an x64 payload from a command via PowerShell
cmd/windows/powershell/x64/shell/bind_ipv6_tcp                     Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
cmd/windows/powershell/x64/shell/bind_ipv6_tcp_uuid                Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/shell/bind_named_pipe                   Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Listen for a pipe connection (Windows x64)
cmd/windows/powershell/x64/shell/bind_tcp                          Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Listen for a connection (Windows x64)
cmd/windows/powershell/x64/shell/bind_tcp_rc4                      Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/powershell/x64/shell/bind_tcp_uuid                     Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/shell/reverse_tcp                       Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker (Windows x64)
cmd/windows/powershell/x64/shell/reverse_tcp_rc4                   Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/powershell/x64/shell/reverse_tcp_uuid                  Execute an x64 payload from a command via PowerShell. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/powershell/x64/shell_bind_tcp                          Execute an x64 payload from a command via PowerShell. Listen for a connection and spawn a command shell (Windows x64)
cmd/windows/powershell/x64/shell_reverse_tcp                       Execute an x64 payload from a command via PowerShell. Connect back to attacker and spawn a command shell (Windows x64)
cmd/windows/powershell/x64/vncinject/bind_ipv6_tcp                 Execute an x64 payload from a command via PowerShell. Listen for an IPv6 connection (Windows x64)
cmd/windows/powershell/x64/vncinject/bind_ipv6_tcp_uuid            Execute an x64 payload from a command via PowerShell. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/vncinject/bind_named_pipe               Execute an x64 payload from a command via PowerShell. Listen for a pipe connection (Windows x64)
cmd/windows/powershell/x64/vncinject/bind_tcp                      Execute an x64 payload from a command via PowerShell. Listen for a connection (Windows x64)
cmd/windows/powershell/x64/vncinject/bind_tcp_rc4                  Execute an x64 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/x64/vncinject/bind_tcp_uuid                 Execute an x64 payload from a command via PowerShell. Listen for a connection with UUID Support (Windows x64)
cmd/windows/powershell/x64/vncinject/reverse_http                  Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/powershell/x64/vncinject/reverse_https                 Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/powershell/x64/vncinject/reverse_tcp                   Execute an x64 payload from a command via PowerShell. Connect back to the attacker (Windows x64)
cmd/windows/powershell/x64/vncinject/reverse_tcp_rc4               Execute an x64 payload from a command via PowerShell. Connect back to the attacker
cmd/windows/powershell/x64/vncinject/reverse_tcp_uuid              Execute an x64 payload from a command via PowerShell. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/powershell/x64/vncinject/reverse_winhttp               Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/powershell/x64/vncinject/reverse_winhttps              Execute an x64 payload from a command via PowerShell. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/powershell_bind_tcp                                    Interacts with a powershell session on an established socket connection
cmd/windows/powershell_reverse_tcp                                 Interacts with a powershell session on an established socket connection
cmd/windows/powershell_reverse_tcp_ssl                             Interacts with a powershell session on an established SSL socket connection
cmd/windows/python/exec                                            Execute a Python payload from a command. Execute an arbitrary OS command. Compatible with Python 2.7 and 3.4+.
cmd/windows/python/meterpreter/bind_tcp                            Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Listen for a connection
cmd/windows/python/meterpreter/bind_tcp_uuid                       Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Listen for a connection with UUID Support
cmd/windows/python/meterpreter/reverse_http                        Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Tunnel communication over HTTP
cmd/windows/python/meterpreter/reverse_https                       Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Tunnel communication over HTTP using SSL
cmd/windows/python/meterpreter/reverse_tcp                         Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Connect back to the attacker
cmd/windows/python/meterpreter/reverse_tcp_ssl                     Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Reverse Python connect back stager using SSL
cmd/windows/python/meterpreter/reverse_tcp_uuid                    Execute a Python payload from a command. Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Connect back to the attacker with UUID Support
cmd/windows/python/meterpreter_bind_tcp                            Execute a Python payload from a command. Connect to the victim and spawn a Meterpreter shell
cmd/windows/python/meterpreter_reverse_http                        Execute a Python payload from a command. Connect back to the attacker and spawn a Meterpreter shell
cmd/windows/python/meterpreter_reverse_https                       Execute a Python payload from a command. Connect back to the attacker and spawn a Meterpreter shell
cmd/windows/python/meterpreter_reverse_tcp                         Execute a Python payload from a command. Connect back to the attacker and spawn a Meterpreter shell
cmd/windows/python/pingback_bind_tcp                               Execute a Python payload from a command. Listens for a connection from the attacker, sends a UUID, then terminates
cmd/windows/python/pingback_reverse_tcp                            Execute a Python payload from a command. Connects back to the attacker, sends a UUID, then terminates
cmd/windows/python/shell_bind_tcp                                  Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.4-2.7 and 3.4+.
cmd/windows/python/shell_reverse_sctp                              Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
cmd/windows/python/shell_reverse_tcp                               Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.4-2.7 and 3.4+.
cmd/windows/python/shell_reverse_tcp_ssl                           Execute a Python payload from a command. Creates an interactive shell via Python, uses SSL, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
cmd/windows/python/shell_reverse_udp                               Execute a Python payload from a command. Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
cmd/windows/reverse_lua                                            Creates an interactive shell via Lua
cmd/windows/reverse_perl                                           Creates an interactive shell via perl
cmd/windows/reverse_powershell                                     Connect back and create a command shell via Powershell
cmd/windows/reverse_ruby                                           Connect back and create a command shell via Ruby
cmd/windows/smb/x64/custom/bind_ipv6_tcp                           Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Listen for an IPv6 connection (Windows x64)
cmd/windows/smb/x64/custom/bind_ipv6_tcp_uuid                      Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/smb/x64/custom/bind_named_pipe                         Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Listen for a pipe connection (Windows x64)
cmd/windows/smb/x64/custom/bind_tcp                                Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Listen for a connection (Windows x64)
cmd/windows/smb/x64/custom/bind_tcp_rc4                            Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Connect back to the attacker
cmd/windows/smb/x64/custom/bind_tcp_uuid                           Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Listen for a connection with UUID Support (Windows x64)
cmd/windows/smb/x64/custom/reverse_http                            Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/smb/x64/custom/reverse_https                           Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/smb/x64/custom/reverse_named_pipe                      Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Connect back to the attacker via a named pipe pivot
cmd/windows/smb/x64/custom/reverse_tcp                             Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Connect back to the attacker (Windows x64)
cmd/windows/smb/x64/custom/reverse_tcp_rc4                         Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Connect back to the attacker
cmd/windows/smb/x64/custom/reverse_tcp_uuid                        Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/smb/x64/custom/reverse_winhttp                         Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/smb/x64/custom/reverse_winhttps                        Fetch and execute an x64 payload from an SMB server. Custom shellcode stage. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/smb/x64/encrypted_shell/reverse_tcp                    Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (staged). Connect to MSF and read in stage
cmd/windows/smb/x64/encrypted_shell_reverse_tcp                    Fetch and execute an x64 payload from an SMB server. Connect back to attacker and spawn an encrypted command shell
cmd/windows/smb/x64/exec                                           Fetch and execute an x64 payload from an SMB server. Execute an arbitrary command (Windows x64)
cmd/windows/smb/x64/loadlibrary                                    Fetch and execute an x64 payload from an SMB server. Load an arbitrary x64 library path
cmd/windows/smb/x64/messagebox                                     Fetch and execute an x64 payload from an SMB server. Spawn a dialog via MessageBox using a customizable title, text & icon
cmd/windows/smb/x64/meterpreter/bind_ipv6_tcp                      Fetch and execute an x64 payload from an SMB server. Listen for an IPv6 connection (Windows x64)
cmd/windows/smb/x64/meterpreter/bind_ipv6_tcp_uuid                 Fetch and execute an x64 payload from an SMB server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/smb/x64/meterpreter/bind_named_pipe                    Fetch and execute an x64 payload from an SMB server. Listen for a pipe connection (Windows x64)
cmd/windows/smb/x64/meterpreter/bind_tcp                           Fetch and execute an x64 payload from an SMB server. Listen for a connection (Windows x64)
cmd/windows/smb/x64/meterpreter/bind_tcp_rc4                       Fetch and execute an x64 payload from an SMB server. Connect back to the attacker
cmd/windows/smb/x64/meterpreter/bind_tcp_uuid                      Fetch and execute an x64 payload from an SMB server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/smb/x64/meterpreter/reverse_http                       Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/smb/x64/meterpreter/reverse_https                      Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/smb/x64/meterpreter/reverse_named_pipe                 Fetch and execute an x64 payload from an SMB server. Connect back to the attacker via a named pipe pivot
cmd/windows/smb/x64/meterpreter/reverse_tcp                        Fetch and execute an x64 payload from an SMB server. Connect back to the attacker (Windows x64)
cmd/windows/smb/x64/meterpreter/reverse_tcp_rc4                    Fetch and execute an x64 payload from an SMB server. Connect back to the attacker
cmd/windows/smb/x64/meterpreter/reverse_tcp_uuid                   Fetch and execute an x64 payload from an SMB server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/smb/x64/meterpreter/reverse_winhttp                    Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/smb/x64/meterpreter/reverse_winhttps                   Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/smb/x64/meterpreter_bind_named_pipe                    Fetch and execute an x64 payload from an SMB server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/smb/x64/meterpreter_bind_tcp                           Fetch and execute an x64 payload from an SMB server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/smb/x64/meterpreter_reverse_http                       Fetch and execute an x64 payload from an SMB server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/smb/x64/meterpreter_reverse_https                      Fetch and execute an x64 payload from an SMB server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/smb/x64/meterpreter_reverse_ipv6_tcp                   Fetch and execute an x64 payload from an SMB server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/smb/x64/meterpreter_reverse_tcp                        Fetch and execute an x64 payload from an SMB server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/smb/x64/peinject/bind_ipv6_tcp                         Fetch and execute an x64 payload from an SMB server. Listen for an IPv6 connection (Windows x64)
cmd/windows/smb/x64/peinject/bind_ipv6_tcp_uuid                    Fetch and execute an x64 payload from an SMB server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/smb/x64/peinject/bind_named_pipe                       Fetch and execute an x64 payload from an SMB server. Listen for a pipe connection (Windows x64)
cmd/windows/smb/x64/peinject/bind_tcp                              Fetch and execute an x64 payload from an SMB server. Listen for a connection (Windows x64)
cmd/windows/smb/x64/peinject/bind_tcp_rc4                          Fetch and execute an x64 payload from an SMB server. Connect back to the attacker
cmd/windows/smb/x64/peinject/bind_tcp_uuid                         Fetch and execute an x64 payload from an SMB server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/smb/x64/peinject/reverse_named_pipe                    Fetch and execute an x64 payload from an SMB server. Connect back to the attacker via a named pipe pivot
cmd/windows/smb/x64/peinject/reverse_tcp                           Fetch and execute an x64 payload from an SMB server. Connect back to the attacker (Windows x64)
cmd/windows/smb/x64/peinject/reverse_tcp_rc4                       Fetch and execute an x64 payload from an SMB server. Connect back to the attacker
cmd/windows/smb/x64/peinject/reverse_tcp_uuid                      Fetch and execute an x64 payload from an SMB server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/smb/x64/pingback_reverse_tcp                           Fetch and execute an x64 payload from an SMB server. Connect back to attacker and report UUID (Windows x64)
cmd/windows/smb/x64/powershell_bind_tcp                            Fetch and execute an x64 payload from an SMB server.
cmd/windows/smb/x64/powershell_reverse_tcp                         Fetch and execute an x64 payload from an SMB server.
cmd/windows/smb/x64/powershell_reverse_tcp_ssl                     Fetch and execute an x64 payload from an SMB server.
cmd/windows/smb/x64/shell/bind_ipv6_tcp                            Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
cmd/windows/smb/x64/shell/bind_ipv6_tcp_uuid                       Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/smb/x64/shell/bind_named_pipe                          Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Listen for a pipe connection (Windows x64)
cmd/windows/smb/x64/shell/bind_tcp                                 Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection (Windows x64)
cmd/windows/smb/x64/shell/bind_tcp_rc4                             Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/smb/x64/shell/bind_tcp_uuid                            Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
cmd/windows/smb/x64/shell/reverse_tcp                              Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker (Windows x64)
cmd/windows/smb/x64/shell/reverse_tcp_rc4                          Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/smb/x64/shell/reverse_tcp_uuid                         Fetch and execute an x64 payload from an SMB server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/smb/x64/shell_bind_tcp                                 Fetch and execute an x64 payload from an SMB server. Listen for a connection and spawn a command shell (Windows x64)
cmd/windows/smb/x64/shell_reverse_tcp                              Fetch and execute an x64 payload from an SMB server. Connect back to attacker and spawn a command shell (Windows x64)
cmd/windows/smb/x64/vncinject/bind_ipv6_tcp                        Fetch and execute an x64 payload from an SMB server. Listen for an IPv6 connection (Windows x64)
cmd/windows/smb/x64/vncinject/bind_ipv6_tcp_uuid                   Fetch and execute an x64 payload from an SMB server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/smb/x64/vncinject/bind_named_pipe                      Fetch and execute an x64 payload from an SMB server. Listen for a pipe connection (Windows x64)
cmd/windows/smb/x64/vncinject/bind_tcp                             Fetch and execute an x64 payload from an SMB server. Listen for a connection (Windows x64)
cmd/windows/smb/x64/vncinject/bind_tcp_rc4                         Fetch and execute an x64 payload from an SMB server. Connect back to the attacker
cmd/windows/smb/x64/vncinject/bind_tcp_uuid                        Fetch and execute an x64 payload from an SMB server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/smb/x64/vncinject/reverse_http                         Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/smb/x64/vncinject/reverse_https                        Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/smb/x64/vncinject/reverse_tcp                          Fetch and execute an x64 payload from an SMB server. Connect back to the attacker (Windows x64)
cmd/windows/smb/x64/vncinject/reverse_tcp_rc4                      Fetch and execute an x64 payload from an SMB server. Connect back to the attacker
cmd/windows/smb/x64/vncinject/reverse_tcp_uuid                     Fetch and execute an x64 payload from an SMB server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/smb/x64/vncinject/reverse_winhttp                      Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/smb/x64/vncinject/reverse_winhttps                     Fetch and execute an x64 payload from an SMB server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/tftp/x64/custom/bind_ipv6_tcp                          Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Listen for an IPv6 connection (Windows x64)
cmd/windows/tftp/x64/custom/bind_ipv6_tcp_uuid                     Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/custom/bind_named_pipe                        Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Listen for a pipe connection (Windows x64)
cmd/windows/tftp/x64/custom/bind_tcp                               Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Listen for a connection (Windows x64)
cmd/windows/tftp/x64/custom/bind_tcp_rc4                           Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Connect back to the attacker
cmd/windows/tftp/x64/custom/bind_tcp_uuid                          Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Listen for a connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/custom/reverse_http                           Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/tftp/x64/custom/reverse_https                          Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/tftp/x64/custom/reverse_named_pipe                     Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Connect back to the attacker via a named pipe pivot
cmd/windows/tftp/x64/custom/reverse_tcp                            Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Connect back to the attacker (Windows x64)
cmd/windows/tftp/x64/custom/reverse_tcp_rc4                        Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Connect back to the attacker
cmd/windows/tftp/x64/custom/reverse_tcp_uuid                       Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/tftp/x64/custom/reverse_winhttp                        Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/tftp/x64/custom/reverse_winhttps                       Fetch and execute an x64 payload from a TFTP server. Custom shellcode stage. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/tftp/x64/encrypted_shell/reverse_tcp                   Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (staged). Connect to MSF and read in stage
cmd/windows/tftp/x64/encrypted_shell_reverse_tcp                   Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn an encrypted command shell
cmd/windows/tftp/x64/exec                                          Fetch and execute an x64 payload from a TFTP server. Execute an arbitrary command (Windows x64)
cmd/windows/tftp/x64/loadlibrary                                   Fetch and execute an x64 payload from a TFTP server. Load an arbitrary x64 library path
cmd/windows/tftp/x64/messagebox                                    Fetch and execute an x64 payload from a TFTP server. Spawn a dialog via MessageBox using a customizable title, text & icon
cmd/windows/tftp/x64/meterpreter/bind_ipv6_tcp                     Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection (Windows x64)
cmd/windows/tftp/x64/meterpreter/bind_ipv6_tcp_uuid                Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/meterpreter/bind_named_pipe                   Fetch and execute an x64 payload from a TFTP server. Listen for a pipe connection (Windows x64)
cmd/windows/tftp/x64/meterpreter/bind_tcp                          Fetch and execute an x64 payload from a TFTP server. Listen for a connection (Windows x64)
cmd/windows/tftp/x64/meterpreter/bind_tcp_rc4                      Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/windows/tftp/x64/meterpreter/bind_tcp_uuid                     Fetch and execute an x64 payload from a TFTP server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/meterpreter/reverse_http                      Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/tftp/x64/meterpreter/reverse_https                     Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/tftp/x64/meterpreter/reverse_named_pipe                Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker via a named pipe pivot
cmd/windows/tftp/x64/meterpreter/reverse_tcp                       Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker (Windows x64)
cmd/windows/tftp/x64/meterpreter/reverse_tcp_rc4                   Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/windows/tftp/x64/meterpreter/reverse_tcp_uuid                  Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/tftp/x64/meterpreter/reverse_winhttp                   Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/tftp/x64/meterpreter/reverse_winhttps                  Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTPS (Windows x64 winhttp)
cmd/windows/tftp/x64/meterpreter_bind_named_pipe                   Fetch and execute an x64 payload from a TFTP server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/tftp/x64/meterpreter_bind_tcp                          Fetch and execute an x64 payload from a TFTP server. Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/tftp/x64/meterpreter_reverse_http                      Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/tftp/x64/meterpreter_reverse_https                     Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/tftp/x64/meterpreter_reverse_ipv6_tcp                  Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/tftp/x64/meterpreter_reverse_tcp                       Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
cmd/windows/tftp/x64/peinject/bind_ipv6_tcp                        Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection (Windows x64)
cmd/windows/tftp/x64/peinject/bind_ipv6_tcp_uuid                   Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/peinject/bind_named_pipe                      Fetch and execute an x64 payload from a TFTP server. Listen for a pipe connection (Windows x64)
cmd/windows/tftp/x64/peinject/bind_tcp                             Fetch and execute an x64 payload from a TFTP server. Listen for a connection (Windows x64)
cmd/windows/tftp/x64/peinject/bind_tcp_rc4                         Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/windows/tftp/x64/peinject/bind_tcp_uuid                        Fetch and execute an x64 payload from a TFTP server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/peinject/reverse_named_pipe                   Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker via a named pipe pivot
cmd/windows/tftp/x64/peinject/reverse_tcp                          Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker (Windows x64)
cmd/windows/tftp/x64/peinject/reverse_tcp_rc4                      Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/windows/tftp/x64/peinject/reverse_tcp_uuid                     Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/tftp/x64/pingback_reverse_tcp                          Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and report UUID (Windows x64)
cmd/windows/tftp/x64/powershell_bind_tcp                           Fetch and execute an x64 payload from a TFTP server.
cmd/windows/tftp/x64/powershell_reverse_tcp                        Fetch and execute an x64 payload from a TFTP server.
cmd/windows/tftp/x64/powershell_reverse_tcp_ssl                    Fetch and execute an x64 payload from a TFTP server.
cmd/windows/tftp/x64/shell/bind_ipv6_tcp                           Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
cmd/windows/tftp/x64/shell/bind_ipv6_tcp_uuid                      Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/shell/bind_named_pipe                         Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Listen for a pipe connection (Windows x64)
cmd/windows/tftp/x64/shell/bind_tcp                                Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection (Windows x64)
cmd/windows/tftp/x64/shell/bind_tcp_rc4                            Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/tftp/x64/shell/bind_tcp_uuid                           Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/shell/reverse_tcp                             Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker (Windows x64)
cmd/windows/tftp/x64/shell/reverse_tcp_rc4                         Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
cmd/windows/tftp/x64/shell/reverse_tcp_uuid                        Fetch and execute an x64 payload from a TFTP server. Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/tftp/x64/shell_bind_tcp                                Fetch and execute an x64 payload from a TFTP server. Listen for a connection and spawn a command shell (Windows x64)
cmd/windows/tftp/x64/shell_reverse_tcp                             Fetch and execute an x64 payload from a TFTP server. Connect back to attacker and spawn a command shell (Windows x64)
cmd/windows/tftp/x64/vncinject/bind_ipv6_tcp                       Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection (Windows x64)
cmd/windows/tftp/x64/vncinject/bind_ipv6_tcp_uuid                  Fetch and execute an x64 payload from a TFTP server. Listen for an IPv6 connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/vncinject/bind_named_pipe                     Fetch and execute an x64 payload from a TFTP server. Listen for a pipe connection (Windows x64)
cmd/windows/tftp/x64/vncinject/bind_tcp                            Fetch and execute an x64 payload from a TFTP server. Listen for a connection (Windows x64)
cmd/windows/tftp/x64/vncinject/bind_tcp_rc4                        Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/windows/tftp/x64/vncinject/bind_tcp_uuid                       Fetch and execute an x64 payload from a TFTP server. Listen for a connection with UUID Support (Windows x64)
cmd/windows/tftp/x64/vncinject/reverse_http                        Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/tftp/x64/vncinject/reverse_https                       Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTP (Windows x64 wininet)
cmd/windows/tftp/x64/vncinject/reverse_tcp                         Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker (Windows x64)
cmd/windows/tftp/x64/vncinject/reverse_tcp_rc4                     Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker
cmd/windows/tftp/x64/vncinject/reverse_tcp_uuid                    Fetch and execute an x64 payload from a TFTP server. Connect back to the attacker with UUID Support (Windows x64)
cmd/windows/tftp/x64/vncinject/reverse_winhttp                     Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTP (Windows x64 winhttp)
cmd/windows/tftp/x64/vncinject/reverse_winhttps                    Fetch and execute an x64 payload from a TFTP server. Tunnel communication over HTTPS (Windows x64 winhttp)
firefox/exec                                                       This module runs a shell command on the target OS without touching the disk. On Windows, this command will flash the command prompt momentarily. This can be avoided by setting WSCRIPT to true, which drops a jscript "launcher" to disk that hides the prompt.
firefox/shell_bind_tcp                                             Creates an interactive shell via Javascript with access to Firefox's XPCOM API
firefox/shell_reverse_tcp                                          Creates an interactive shell via Javascript with access to Firefox's XPCOM API
generic/custom                                                     Use custom string or file as payload. Set either PAYLOADFILE or PAYLOADSTR.
generic/debug_trap                                                 Generate a debug trap in the target process
generic/shell_bind_aws_ssm                                         Creates an interactive shell using AWS SSM
generic/shell_bind_tcp                                             Listen for a connection and spawn a command shell
generic/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
generic/ssh/interact                                               Interacts with a shell on an established SSH connection
generic/tight_loop                                                 Generate a tight loop in the target process
java/jsp_shell_bind_tcp                                            Listen for a connection and spawn a command shell
java/jsp_shell_reverse_tcp                                         Connect back to attacker and spawn a command shell
java/meterpreter/bind_tcp                                          Run a meterpreter server in Java. Listen for a connection
java/meterpreter/reverse_http                                      Run a meterpreter server in Java. Tunnel communication over HTTP
java/meterpreter/reverse_https                                     Run a meterpreter server in Java. Tunnel communication over HTTPS
java/meterpreter/reverse_tcp                                       Run a meterpreter server in Java. Connect back stager
java/shell/bind_tcp                                                Spawn a piped command shell (cmd.exe on Windows, /bin/sh everywhere else). Listen for a connection
java/shell/reverse_tcp                                             Spawn a piped command shell (cmd.exe on Windows, /bin/sh everywhere else). Connect back stager
java/shell_reverse_tcp                                             Connect back to attacker and spawn a command shell
linux/aarch64/meterpreter/reverse_tcp                              Inject the mettle server payload (staged). Connect back to the attacker
linux/aarch64/meterpreter_reverse_http                             Run the Meterpreter / Mettle server payload (stageless)
linux/aarch64/meterpreter_reverse_https                            Run the Meterpreter / Mettle server payload (stageless)
linux/aarch64/meterpreter_reverse_tcp                              Run the Meterpreter / Mettle server payload (stageless)
linux/aarch64/shell/reverse_tcp                                    dup2 socket in x12, then execve. Connect back to the attacker
linux/aarch64/shell_reverse_tcp                                    Connect back to attacker and spawn a command shell
linux/armbe/meterpreter_reverse_http                               Run the Meterpreter / Mettle server payload (stageless)
linux/armbe/meterpreter_reverse_https                              Run the Meterpreter / Mettle server payload (stageless)
linux/armbe/meterpreter_reverse_tcp                                Run the Meterpreter / Mettle server payload (stageless)
linux/armbe/shell_bind_tcp                                         Listen for a connection and spawn a command shell
linux/armle/adduser                                                Create a new user with UID 0
linux/armle/exec                                                   Execute an arbitrary command
linux/armle/meterpreter/bind_tcp                                   Inject the mettle server payload (staged). Listen for a connection
linux/armle/meterpreter/reverse_tcp                                Inject the mettle server payload (staged). Connect back to the attacker
linux/armle/meterpreter_reverse_http                               Run the Meterpreter / Mettle server payload (stageless)
linux/armle/meterpreter_reverse_https                              Run the Meterpreter / Mettle server payload (stageless)
linux/armle/meterpreter_reverse_tcp                                Run the Meterpreter / Mettle server payload (stageless)
linux/armle/shell/bind_tcp                                         dup2 socket in r12, then execve. Listen for a connection
linux/armle/shell/reverse_tcp                                      dup2 socket in r12, then execve. Connect back to the attacker
linux/armle/shell_bind_tcp                                         Connect to target and spawn a command shell
linux/armle/shell_reverse_tcp                                      Connect back to attacker and spawn a command shell
linux/mips64/meterpreter_reverse_http                              Run the Meterpreter / Mettle server payload (stageless)
linux/mips64/meterpreter_reverse_https                             Run the Meterpreter / Mettle server payload (stageless)
linux/mips64/meterpreter_reverse_tcp                               Run the Meterpreter / Mettle server payload (stageless)
linux/mipsbe/exec                                                  A very small shellcode for executing commands. This module is sometimes helpful for testing purposes.
linux/mipsbe/meterpreter/reverse_tcp                               Inject the mettle server payload (staged). Connect back to the attacker
linux/mipsbe/meterpreter_reverse_http                              Run the Meterpreter / Mettle server payload (stageless)
linux/mipsbe/meterpreter_reverse_https                             Run the Meterpreter / Mettle server payload (stageless)
linux/mipsbe/meterpreter_reverse_tcp                               Run the Meterpreter / Mettle server payload (stageless)
linux/mipsbe/reboot                                                A very small shellcode for rebooting the system. This payload is sometimes helpful for testing purposes or executing other payloads that rely on initial startup procedures.
linux/mipsbe/shell/reverse_tcp                                     Spawn a command shell (staged). Connect back to the attacker
linux/mipsbe/shell_bind_tcp                                        Listen for a connection and spawn a command shell
linux/mipsbe/shell_reverse_tcp                                     Connect back to attacker and spawn a command shell
linux/mipsle/exec                                                  A very small shellcode for executing commands. This module is sometimes helpful for testing purposes as well as on targets with extremely limited buffer space.
linux/mipsle/meterpreter/reverse_tcp                               Inject the mettle server payload (staged). Connect back to the attacker
linux/mipsle/meterpreter_reverse_http                              Run the Meterpreter / Mettle server payload (stageless)
linux/mipsle/meterpreter_reverse_https                             Run the Meterpreter / Mettle server payload (stageless)
linux/mipsle/meterpreter_reverse_tcp                               Run the Meterpreter / Mettle server payload (stageless)
linux/mipsle/reboot                                                A very small shellcode for rebooting the system. This payload is sometimes helpful for testing purposes.
linux/mipsle/shell/reverse_tcp                                     Spawn a command shell (staged). Connect back to the attacker
linux/mipsle/shell_bind_tcp                                        Listen for a connection and spawn a command shell
linux/mipsle/shell_reverse_tcp                                     Connect back to attacker and spawn a command shell
linux/ppc/meterpreter_reverse_http                                 Run the Meterpreter / Mettle server payload (stageless)
linux/ppc/meterpreter_reverse_https                                Run the Meterpreter / Mettle server payload (stageless)
linux/ppc/meterpreter_reverse_tcp                                  Run the Meterpreter / Mettle server payload (stageless)
linux/ppc/shell_bind_tcp                                           Listen for a connection and spawn a command shell
linux/ppc/shell_find_port                                          Spawn a shell on an established connection
linux/ppc/shell_reverse_tcp                                        Connect back to attacker and spawn a command shell
linux/ppc64/shell_bind_tcp                                         Listen for a connection and spawn a command shell
linux/ppc64/shell_find_port                                        Spawn a shell on an established connection
linux/ppc64/shell_reverse_tcp                                      Connect back to attacker and spawn a command shell
linux/ppc64le/meterpreter_reverse_http                             Run the Meterpreter / Mettle server payload (stageless)
linux/ppc64le/meterpreter_reverse_https                            Run the Meterpreter / Mettle server payload (stageless)
linux/ppc64le/meterpreter_reverse_tcp                              Run the Meterpreter / Mettle server payload (stageless)
linux/ppce500v2/meterpreter_reverse_http                           Run the Meterpreter / Mettle server payload (stageless)
linux/ppce500v2/meterpreter_reverse_https                          Run the Meterpreter / Mettle server payload (stageless)
linux/ppce500v2/meterpreter_reverse_tcp                            Run the Meterpreter / Mettle server payload (stageless)
linux/riscv32le/exec                                               Execute an arbitrary command
linux/riscv32le/reboot                                             A very small shellcode for rebooting the system using the reboot syscall. This payload is sometimes helpful for testing purposes.
linux/riscv64le/exec                                               Execute an arbitrary command
linux/riscv64le/reboot                                             A very small shellcode for rebooting the system using the reboot syscall. This payload is sometimes helpful for testing purposes.
linux/x64/exec                                                     Execute an arbitrary command or just a /bin/sh shell
linux/x64/meterpreter/bind_tcp                                     Inject the mettle server payload (staged). Listen for a connection
linux/x64/meterpreter/reverse_sctp                                 Inject the mettle server payload (staged). Connect back to the attacker
linux/x64/meterpreter/reverse_tcp                                  Inject the mettle server payload (staged). Connect back to the attacker
linux/x64/meterpreter_reverse_http                                 Run the Meterpreter / Mettle server payload (stageless)
linux/x64/meterpreter_reverse_https                                Run the Meterpreter / Mettle server payload (stageless)
linux/x64/meterpreter_reverse_tcp                                  Run the Meterpreter / Mettle server payload (stageless)
linux/x64/pingback_bind_tcp                                        Accept a connection from attacker and report UUID (Linux x64)
linux/x64/pingback_reverse_tcp                                     Connect back to attacker and report UUID (Linux x64)
linux/x64/shell/bind_tcp                                           Spawn a command shell (staged). Listen for a connection
linux/x64/shell/reverse_sctp                                       Spawn a command shell (staged). Connect back to the attacker
linux/x64/shell/reverse_tcp                                        Spawn a command shell (staged). Connect back to the attacker
linux/x64/shell_bind_ipv6_tcp                                      Listen for an IPv6 connection and spawn a command shell
linux/x64/shell_bind_tcp                                           Listen for a connection and spawn a command shell
linux/x64/shell_bind_tcp_random_port                               Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
linux/x64/shell_find_port                                          Spawn a shell on an established connection
linux/x64/shell_reverse_ipv6_tcp                                   Connect back to attacker and spawn a command shell over IPv6
linux/x64/shell_reverse_tcp                                        Connect back to attacker and spawn a command shell
linux/x86/adduser                                                  Create a new user with UID 0
linux/x86/chmod                                                    Runs chmod on specified file with specified mode
linux/x86/exec                                                     Execute an arbitrary command or just a /bin/sh shell
linux/x86/meterpreter/bind_ipv6_tcp                                Inject the mettle server payload (staged). Listen for an IPv6 connection (Linux x86)
linux/x86/meterpreter/bind_ipv6_tcp_uuid                           Inject the mettle server payload (staged). Listen for an IPv6 connection with UUID Support (Linux x86)
linux/x86/meterpreter/bind_nonx_tcp                                Inject the mettle server payload (staged). Listen for a connection
linux/x86/meterpreter/bind_tcp                                     Inject the mettle server payload (staged). Listen for a connection (Linux x86)
linux/x86/meterpreter/bind_tcp_uuid                                Inject the mettle server payload (staged). Listen for a connection with UUID Support (Linux x86)
linux/x86/meterpreter/find_tag                                     Inject the mettle server payload (staged). Use an established connection
linux/x86/meterpreter/reverse_ipv6_tcp                             Inject the mettle server payload (staged). Connect back to attacker over IPv6
linux/x86/meterpreter/reverse_nonx_tcp                             Inject the mettle server payload (staged). Connect back to the attacker
linux/x86/meterpreter/reverse_tcp                                  Inject the mettle server payload (staged). Connect back to the attacker
linux/x86/meterpreter/reverse_tcp_uuid                             Inject the mettle server payload (staged). Connect back to the attacker
linux/x86/meterpreter_reverse_http                                 Run the Meterpreter / Mettle server payload (stageless)
linux/x86/meterpreter_reverse_https                                Run the Meterpreter / Mettle server payload (stageless)
linux/x86/meterpreter_reverse_tcp                                  Run the Meterpreter / Mettle server payload (stageless)
linux/x86/metsvc_bind_tcp                                          Stub payload for interacting with a Meterpreter Service
linux/x86/metsvc_reverse_tcp                                       Stub payload for interacting with a Meterpreter Service
linux/x86/read_file                                                Read up to 4096 bytes from the local file system and write it back out to the specified file descriptor
linux/x86/shell/bind_ipv6_tcp                                      Spawn a command shell (staged). Listen for an IPv6 connection (Linux x86)
linux/x86/shell/bind_ipv6_tcp_uuid                                 Spawn a command shell (staged). Listen for an IPv6 connection with UUID Support (Linux x86)
linux/x86/shell/bind_nonx_tcp                                      Spawn a command shell (staged). Listen for a connection
linux/x86/shell/bind_tcp                                           Spawn a command shell (staged). Listen for a connection (Linux x86)
linux/x86/shell/bind_tcp_uuid                                      Spawn a command shell (staged). Listen for a connection with UUID Support (Linux x86)
linux/x86/shell/find_tag                                           Spawn a command shell (staged). Use an established connection
linux/x86/shell/reverse_ipv6_tcp                                   Spawn a command shell (staged). Connect back to attacker over IPv6
linux/x86/shell/reverse_nonx_tcp                                   Spawn a command shell (staged). Connect back to the attacker
linux/x86/shell/reverse_tcp                                        Spawn a command shell (staged). Connect back to the attacker
linux/x86/shell/reverse_tcp_uuid                                   Spawn a command shell (staged). Connect back to the attacker
linux/x86/shell_bind_ipv6_tcp                                      Listen for a connection over IPv6 and spawn a command shell
linux/x86/shell_bind_tcp                                           Listen for a connection and spawn a command shell
linux/x86/shell_bind_tcp_random_port                               Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
linux/x86/shell_find_port                                          Spawn a shell on an established connection
linux/x86/shell_find_tag                                           Spawn a shell on an established connection (proxy/nat safe)
linux/x86/shell_reverse_tcp                                        Connect back to attacker and spawn a command shell
linux/x86/shell_reverse_tcp_ipv6                                   Connect back to attacker and spawn a command shell over IPv6
linux/zarch/meterpreter_reverse_http                               Run the Meterpreter / Mettle server payload (stageless)
linux/zarch/meterpreter_reverse_https                              Run the Meterpreter / Mettle server payload (stageless)
linux/zarch/meterpreter_reverse_tcp                                Run the Meterpreter / Mettle server payload (stageless)
mainframe/shell_reverse_tcp                                        Listen for a connection and spawn a command shell. This implementation does not include ebcdic character translation, so a client with translation capabilities is required. MSF handles this automatically.
multi/meterpreter/reverse_http                                     Handle Meterpreter sessions regardless of the target arch/platform. Tunnel communication over HTTP
multi/meterpreter/reverse_https                                    Handle Meterpreter sessions regardless of the target arch/platform. Tunnel communication over HTTPS
netware/shell/reverse_tcp                                          Connect to the NetWare console (staged). Connect back to the attacker
nodejs/shell_bind_tcp                                              Creates an interactive shell via nodejs
nodejs/shell_reverse_tcp                                           Creates an interactive shell via nodejs
nodejs/shell_reverse_tcp_ssl                                       Creates an interactive shell via nodejs, uses SSL
osx/aarch64/exec                                                   Execute an arbitrary command
osx/aarch64/meterpreter/reverse_tcp                                Inject the mettle server payload (staged). Connect back to the attacker
osx/aarch64/meterpreter_reverse_http                               Run the Meterpreter / Mettle server payload (stageless)
osx/aarch64/meterpreter_reverse_https                              Run the Meterpreter / Mettle server payload (stageless)
osx/aarch64/meterpreter_reverse_tcp                                Run the Meterpreter / Mettle server payload (stageless)
osx/aarch64/shell_bind_tcp                                         Bind an arbitrary command to an arbitrary port
osx/aarch64/shell_reverse_tcp                                      Connect back to attacker and spawn a command shell
osx/armle/execute/bind_tcp                                         Spawn a command shell (staged). Listen for a connection
osx/armle/execute/reverse_tcp                                      Spawn a command shell (staged). Connect back to the attacker
osx/armle/shell/bind_tcp                                           Spawn a command shell (staged). Listen for a connection
osx/armle/shell/reverse_tcp                                        Spawn a command shell (staged). Connect back to the attacker
osx/armle/shell_bind_tcp                                           Listen for a connection and spawn a command shell
osx/armle/shell_reverse_tcp                                        Connect back to attacker and spawn a command shell
osx/armle/vibrate                                                  Causes the iPhone to vibrate, only works when the AudioToolkit library has been loaded. Based on work by Charlie Miller <cmiller[at]securityevaluators.com>.
osx/ppc/shell/bind_tcp                                             Spawn a command shell (staged). Listen for a connection
osx/ppc/shell/find_tag                                             Spawn a command shell (staged). Use an established connection
osx/ppc/shell/reverse_tcp                                          Spawn a command shell (staged). Connect back to the attacker
osx/ppc/shell_bind_tcp                                             Listen for a connection and spawn a command shell
osx/ppc/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
osx/x64/dupandexecve/bind_tcp                                      dup2 socket in edi, then execve. Listen, read length, read buffer, execute
osx/x64/dupandexecve/reverse_tcp                                   dup2 socket in edi, then execve. Connect, read length, read buffer, execute
osx/x64/dupandexecve/reverse_tcp_uuid                              dup2 socket in edi, then execve. Connect back to the attacker with UUID Support (OSX x64)
osx/x64/exec                                                       Execute an arbitrary command
osx/x64/meterpreter/bind_tcp                                       Inject the mettle server payload (staged). Listen, read length, read buffer, execute
osx/x64/meterpreter/reverse_tcp                                    Inject the mettle server payload (staged). Connect, read length, read buffer, execute
osx/x64/meterpreter/reverse_tcp_uuid                               Inject the mettle server payload (staged). Connect back to the attacker with UUID Support (OSX x64)
osx/x64/meterpreter_reverse_http                                   Run the Meterpreter / Mettle server payload (stageless)
osx/x64/meterpreter_reverse_https                                  Run the Meterpreter / Mettle server payload (stageless)
osx/x64/meterpreter_reverse_tcp                                    Run the Meterpreter / Mettle server payload (stageless)
osx/x64/say                                                        Say an arbitrary string outloud using Mac OS X text2speech
osx/x64/shell_bind_tcp                                             Bind an arbitrary command to an arbitrary port
osx/x64/shell_find_tag                                             Spawn a shell on an established connection (proxy/nat safe)
osx/x64/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
osx/x86/bundleinject/bind_tcp                                      Inject a custom Mach-O bundle into the exploited process. Listen, read length, read buffer, execute
osx/x86/bundleinject/reverse_tcp                                   Inject a custom Mach-O bundle into the exploited process. Connect, read length, read buffer, execute
osx/x86/exec                                                       Execute an arbitrary command
osx/x86/isight/bind_tcp                                            Inject a Mach-O bundle to capture a photo from the iSight (staged). Listen, read length, read buffer, execute
osx/x86/isight/reverse_tcp                                         Inject a Mach-O bundle to capture a photo from the iSight (staged). Connect, read length, read buffer, execute
osx/x86/shell_bind_tcp                                             Listen for a connection and spawn a command shell
osx/x86/shell_find_port                                            Spawn a shell on an established connection
osx/x86/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
osx/x86/vforkshell/bind_tcp                                        Call vfork() if necessary and spawn a command shell (staged). Listen, read length, read buffer, execute
osx/x86/vforkshell/reverse_tcp                                     Call vfork() if necessary and spawn a command shell (staged). Connect, read length, read buffer, execute
osx/x86/vforkshell_bind_tcp                                        Listen for a connection, vfork if necessary, and spawn a command shell
osx/x86/vforkshell_reverse_tcp                                     Connect back to attacker, vfork if necessary, and spawn a command shell
php/bind_perl                                                      Listen for a connection and spawn a command shell via perl (persistent)
php/bind_perl_ipv6                                                 Listen for a connection and spawn a command shell via perl (persistent) over IPv6
php/bind_php                                                       Listen for a connection and spawn a command shell via php
php/bind_php_ipv6                                                  Listen for a connection and spawn a command shell via php (IPv6)
php/download_exec                                                  Download an EXE from an HTTP URL and execute it
php/exec                                                           Execute a single system command
php/meterpreter/bind_tcp                                           Run a meterpreter server in PHP. Listen for a connection
php/meterpreter/bind_tcp_ipv6                                      Run a meterpreter server in PHP. Listen for a connection over IPv6
php/meterpreter/bind_tcp_ipv6_uuid                                 Run a meterpreter server in PHP. Listen for a connection over IPv6 with UUID Support
php/meterpreter/bind_tcp_uuid                                      Run a meterpreter server in PHP. Listen for a connection with UUID Support
php/meterpreter/reverse_tcp                                        Run a meterpreter server in PHP. Reverse PHP connect back stager with checks for disabled functions
php/meterpreter/reverse_tcp_uuid                                   Run a meterpreter server in PHP. Reverse PHP connect back stager with checks for disabled functions
php/meterpreter_reverse_tcp                                        Connect back to attacker and spawn a Meterpreter server (PHP)
php/reverse_perl                                                   Creates an interactive shell via perl
php/reverse_php                                                    Reverse PHP connect back shell with checks for disabled functions
php/shell_findsock                                                 Spawn a shell on the established connection to the webserver. Unfortunately, this payload can leave conspicuous evil-looking entries in the apache error logs, so it is probably a good idea to use a bind or reverse shell unless firewalls prevent them from working. The issue this payload takes advantage of (CLOEXEC flag not set on sockets) appears to have been patched on the Ubuntu version of Apache and may not work on other Debian-based distributions. Only tested on Apache but it might work on other web servers that leak file descriptors to child processes.
python/exec                                                        Execute an arbitrary OS command. Compatible with Python 2.7 and 3.4+.
python/meterpreter/bind_tcp                                        Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Listen for a connection
python/meterpreter/bind_tcp_uuid                                   Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Listen for a connection with UUID Support
python/meterpreter/reverse_http                                    Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Tunnel communication over HTTP
python/meterpreter/reverse_https                                   Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Tunnel communication over HTTP using SSL
python/meterpreter/reverse_tcp                                     Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Connect back to the attacker
python/meterpreter/reverse_tcp_ssl                                 Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Reverse Python connect back stager using SSL
python/meterpreter/reverse_tcp_uuid                                Run a meterpreter server in Python (compatible with 2.5-2.7 & 3.1+). Connect back to the attacker with UUID Support
python/meterpreter_bind_tcp                                        Connect to the victim and spawn a Meterpreter shell
python/meterpreter_reverse_http                                    Connect back to the attacker and spawn a Meterpreter shell
python/meterpreter_reverse_https                                   Connect back to the attacker and spawn a Meterpreter shell
python/meterpreter_reverse_tcp                                     Connect back to the attacker and spawn a Meterpreter shell
python/pingback_bind_tcp                                           Listens for a connection from the attacker, sends a UUID, then terminates
python/pingback_reverse_tcp                                        Connects back to the attacker, sends a UUID, then terminates
python/shell_bind_tcp                                              Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.4-2.7 and 3.4+.
python/shell_reverse_sctp                                          Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
python/shell_reverse_tcp                                           Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.4-2.7 and 3.4+.
python/shell_reverse_tcp_ssl                                       Creates an interactive shell via Python, uses SSL, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
python/shell_reverse_udp                                           Creates an interactive shell via Python, encodes with base64 by design. Compatible with Python 2.6-2.7 and 3.4+.
r/shell_bind_tcp                                                   Continually listen for a connection and spawn a command shell via R
r/shell_reverse_tcp                                                Connect back and create a command shell via R
ruby/pingback_bind_tcp                                             Listens for a connection from the attacker, sends a UUID, then terminates
ruby/pingback_reverse_tcp                                          Connect back to the attacker, sends a UUID, then terminates
ruby/shell_bind_tcp                                                Continually listen for a connection and spawn a command shell via Ruby
ruby/shell_bind_tcp_ipv6                                           Continually listen for a connection and spawn a command shell via Ruby
ruby/shell_reverse_tcp                                             Connect back and create a command shell via Ruby
ruby/shell_reverse_tcp_ssl                                         Connect back and create a command shell via Ruby, uses SSL
solaris/sparc/shell_bind_tcp                                       Listen for a connection and spawn a command shell
solaris/sparc/shell_find_port                                      Spawn a shell on an established connection
solaris/sparc/shell_reverse_tcp                                    Connect back to attacker and spawn a command shell
solaris/x86/shell_bind_tcp                                         Listen for a connection and spawn a command shell
solaris/x86/shell_find_port                                        Spawn a shell on an established connection
solaris/x86/shell_reverse_tcp                                      Connect back to attacker and spawn a command shell
tty/unix/interact                                                  Interacts with a TTY on an established socket connection
windows/adduser                                                    Create a new user and add them to local administration group. Note: The specified password is checked for common complexity requirements to prevent the target machine rejecting the user for failing to meet policy requirements. Complexity check: 8-14 chars (1 UPPER, 1 lower, 1 digit/special)
windows/custom/bind_hidden_ipknock_tcp                             Custom shellcode stage. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/custom/bind_hidden_tcp                                     Custom shellcode stage. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/custom/bind_ipv6_tcp                                       Custom shellcode stage. Listen for an IPv6 connection (Windows x86)
windows/custom/bind_ipv6_tcp_uuid                                  Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x86)
windows/custom/bind_named_pipe                                     Custom shellcode stage. Listen for a pipe connection (Windows x86)
windows/custom/bind_nonx_tcp                                       Custom shellcode stage. Listen for a connection (No NX)
windows/custom/bind_tcp                                            Custom shellcode stage. Listen for a connection (Windows x86)
windows/custom/bind_tcp_rc4                                        Custom shellcode stage. Listen for a connection
windows/custom/bind_tcp_uuid                                       Custom shellcode stage. Listen for a connection with UUID Support (Windows x86)
windows/custom/find_tag                                            Custom shellcode stage. Use an established connection
windows/custom/reverse_http                                        Custom shellcode stage. Tunnel communication over HTTP (Windows wininet)
windows/custom/reverse_http_proxy_pstore                           Custom shellcode stage. Tunnel communication over HTTP
windows/custom/reverse_https                                       Custom shellcode stage. Tunnel communication over HTTPS (Windows wininet)
windows/custom/reverse_ipv6_tcp                                    Custom shellcode stage. Connect back to the attacker over IPv6
windows/custom/reverse_named_pipe                                  Custom shellcode stage. Connect back to the attacker via a named pipe pivot
windows/custom/reverse_nonx_tcp                                    Custom shellcode stage. Connect back to the attacker (No NX)
windows/custom/reverse_ord_tcp                                     Custom shellcode stage. Connect back to the attacker
windows/custom/reverse_tcp                                         Custom shellcode stage. Connect back to the attacker
windows/custom/reverse_tcp_allports                                Custom shellcode stage. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/custom/reverse_tcp_dns                                     Custom shellcode stage. Connect back to the attacker
windows/custom/reverse_tcp_rc4                                     Custom shellcode stage. Connect back to the attacker
windows/custom/reverse_tcp_rc4_dns                                 Custom shellcode stage. Connect back to the attacker
windows/custom/reverse_tcp_uuid                                    Custom shellcode stage. Connect back to the attacker with UUID Support
windows/custom/reverse_udp                                         Custom shellcode stage. Connect back to the attacker with UUID Support
windows/custom/reverse_winhttp                                     Custom shellcode stage. Tunnel communication over HTTP (Windows winhttp)
windows/custom/reverse_winhttps                                    Custom shellcode stage. Tunnel communication over HTTPS (Windows winhttp)
windows/dllinject/bind_hidden_ipknock_tcp                          Inject a DLL via a reflective loader. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/dllinject/bind_hidden_tcp                                  Inject a DLL via a reflective loader. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/dllinject/bind_ipv6_tcp                                    Inject a DLL via a reflective loader. Listen for an IPv6 connection (Windows x86)
windows/dllinject/bind_ipv6_tcp_uuid                               Inject a DLL via a reflective loader. Listen for an IPv6 connection with UUID Support (Windows x86)
windows/dllinject/bind_named_pipe                                  Inject a DLL via a reflective loader. Listen for a pipe connection (Windows x86)
windows/dllinject/bind_nonx_tcp                                    Inject a DLL via a reflective loader. Listen for a connection (No NX)
windows/dllinject/bind_tcp                                         Inject a DLL via a reflective loader. Listen for a connection (Windows x86)
windows/dllinject/bind_tcp_rc4                                     Inject a DLL via a reflective loader. Listen for a connection
windows/dllinject/bind_tcp_uuid                                    Inject a DLL via a reflective loader. Listen for a connection with UUID Support (Windows x86)
windows/dllinject/find_tag                                         Inject a DLL via a reflective loader. Use an established connection
windows/dllinject/reverse_http                                     Inject a DLL via a reflective loader. Tunnel communication over HTTP (Windows wininet)
windows/dllinject/reverse_http_proxy_pstore                        Inject a DLL via a reflective loader. Tunnel communication over HTTP
windows/dllinject/reverse_ipv6_tcp                                 Inject a DLL via a reflective loader. Connect back to the attacker over IPv6
windows/dllinject/reverse_nonx_tcp                                 Inject a DLL via a reflective loader. Connect back to the attacker (No NX)
windows/dllinject/reverse_ord_tcp                                  Inject a DLL via a reflective loader. Connect back to the attacker
windows/dllinject/reverse_tcp                                      Inject a DLL via a reflective loader. Connect back to the attacker
windows/dllinject/reverse_tcp_allports                             Inject a DLL via a reflective loader. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/dllinject/reverse_tcp_dns                                  Inject a DLL via a reflective loader. Connect back to the attacker
windows/dllinject/reverse_tcp_rc4                                  Inject a DLL via a reflective loader. Connect back to the attacker
windows/dllinject/reverse_tcp_rc4_dns                              Inject a DLL via a reflective loader. Connect back to the attacker
windows/dllinject/reverse_tcp_uuid                                 Inject a DLL via a reflective loader. Connect back to the attacker with UUID Support
windows/dllinject/reverse_winhttp                                  Inject a DLL via a reflective loader. Tunnel communication over HTTP (Windows winhttp)
windows/dns_txt_query_exec                                         Performs a TXT query against a series of DNS record(s) and executes the returned x86 shellcode. The DNSZONE option is used as the base name to iterate over. The payload will first request the TXT contents of the a hostname, followed by b, then c, etc. until there are no more records. For each record that is returned, exactly 255 bytes from it are copied into a buffer that is eventually executed. This buffer should be encoded using x86/alpha_mixed with the BufferRegister option set to EDI.
windows/download_exec                                              Download an EXE from an HTTP(S)/FTP URL and execute it
windows/exec                                                       Execute an arbitrary command
windows/format_all_drives                                          This payload formats all mounted disks in Windows (aka ShellcodeOfDeath). After formatting, this payload sets the volume label to the string specified in the VOLUMELABEL option. If the code is unable to access a drive for any reason, it skips the drive and proceeds to the next volume.
windows/loadlibrary                                                Load an arbitrary library path
windows/messagebox                                                 Spawns a dialog via MessageBox using a customizable title, text & icon
windows/meterpreter/bind_hidden_ipknock_tcp                        Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/meterpreter/bind_hidden_tcp                                Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/meterpreter/bind_ipv6_tcp                                  Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for an IPv6 connection (Windows x86)
windows/meterpreter/bind_ipv6_tcp_uuid                             Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for an IPv6 connection with UUID Support (Windows x86)
windows/meterpreter/bind_named_pipe                                Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a pipe connection (Windows x86)
windows/meterpreter/bind_nonx_tcp                                  Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection (No NX)
windows/meterpreter/bind_tcp                                       Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection (Windows x86)
windows/meterpreter/bind_tcp_rc4                                   Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection
windows/meterpreter/bind_tcp_uuid                                  Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection with UUID Support (Windows x86)
windows/meterpreter/find_tag                                       Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Use an established connection
windows/meterpreter/reverse_http                                   Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTP (Windows wininet)
windows/meterpreter/reverse_http_proxy_pstore                      Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTP
windows/meterpreter/reverse_https                                  Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTPS (Windows wininet)
windows/meterpreter/reverse_ipv6_tcp                               Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker over IPv6
windows/meterpreter/reverse_named_pipe                             Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker via a named pipe pivot
windows/meterpreter/reverse_nonx_tcp                               Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker (No NX)
windows/meterpreter/reverse_ord_tcp                                Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/meterpreter/reverse_tcp                                    Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/meterpreter/reverse_tcp_allports                           Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/meterpreter/reverse_tcp_dns                                Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/meterpreter/reverse_tcp_rc4                                Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/meterpreter/reverse_tcp_rc4_dns                            Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/meterpreter/reverse_tcp_uuid                               Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker with UUID Support
windows/meterpreter/reverse_winhttp                                Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTP (Windows winhttp)
windows/meterpreter/reverse_winhttps                               Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTPS (Windows winhttp)
windows/meterpreter_bind_named_pipe                                Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/meterpreter_bind_tcp                                       Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/meterpreter_reverse_http                                   Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/meterpreter_reverse_https                                  Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/meterpreter_reverse_ipv6_tcp                               Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/meterpreter_reverse_tcp                                    Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/metsvc_bind_tcp                                            Stub payload for interacting with a Meterpreter Service
windows/metsvc_reverse_tcp                                         Stub payload for interacting with a Meterpreter Service
windows/patchupdllinject/bind_hidden_ipknock_tcp                   Inject a custom DLL into the exploited process. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/patchupdllinject/bind_hidden_tcp                           Inject a custom DLL into the exploited process. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/patchupdllinject/bind_ipv6_tcp                             Inject a custom DLL into the exploited process. Listen for an IPv6 connection (Windows x86)
windows/patchupdllinject/bind_ipv6_tcp_uuid                        Inject a custom DLL into the exploited process. Listen for an IPv6 connection with UUID Support (Windows x86)
windows/patchupdllinject/bind_named_pipe                           Inject a custom DLL into the exploited process. Listen for a pipe connection (Windows x86)
windows/patchupdllinject/bind_nonx_tcp                             Inject a custom DLL into the exploited process. Listen for a connection (No NX)
windows/patchupdllinject/bind_tcp                                  Inject a custom DLL into the exploited process. Listen for a connection (Windows x86)
windows/patchupdllinject/bind_tcp_rc4                              Inject a custom DLL into the exploited process. Listen for a connection
windows/patchupdllinject/bind_tcp_uuid                             Inject a custom DLL into the exploited process. Listen for a connection with UUID Support (Windows x86)
windows/patchupdllinject/find_tag                                  Inject a custom DLL into the exploited process. Use an established connection
windows/patchupdllinject/reverse_ipv6_tcp                          Inject a custom DLL into the exploited process. Connect back to the attacker over IPv6
windows/patchupdllinject/reverse_nonx_tcp                          Inject a custom DLL into the exploited process. Connect back to the attacker (No NX)
windows/patchupdllinject/reverse_ord_tcp                           Inject a custom DLL into the exploited process. Connect back to the attacker
windows/patchupdllinject/reverse_tcp                               Inject a custom DLL into the exploited process. Connect back to the attacker
windows/patchupdllinject/reverse_tcp_allports                      Inject a custom DLL into the exploited process. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/patchupdllinject/reverse_tcp_dns                           Inject a custom DLL into the exploited process. Connect back to the attacker
windows/patchupdllinject/reverse_tcp_rc4                           Inject a custom DLL into the exploited process. Connect back to the attacker
windows/patchupdllinject/reverse_tcp_rc4_dns                       Inject a custom DLL into the exploited process. Connect back to the attacker
windows/patchupdllinject/reverse_tcp_uuid                          Inject a custom DLL into the exploited process. Connect back to the attacker with UUID Support
windows/patchupmeterpreter/bind_hidden_ipknock_tcp                 Inject the meterpreter server DLL (staged). Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/patchupmeterpreter/bind_hidden_tcp                         Inject the meterpreter server DLL (staged). Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/patchupmeterpreter/bind_ipv6_tcp                           Inject the meterpreter server DLL (staged). Listen for an IPv6 connection (Windows x86)
windows/patchupmeterpreter/bind_ipv6_tcp_uuid                      Inject the meterpreter server DLL (staged). Listen for an IPv6 connection with UUID Support (Windows x86)
windows/patchupmeterpreter/bind_named_pipe                         Inject the meterpreter server DLL (staged). Listen for a pipe connection (Windows x86)
windows/patchupmeterpreter/bind_nonx_tcp                           Inject the meterpreter server DLL (staged). Listen for a connection (No NX)
windows/patchupmeterpreter/bind_tcp                                Inject the meterpreter server DLL (staged). Listen for a connection (Windows x86)
windows/patchupmeterpreter/bind_tcp_rc4                            Inject the meterpreter server DLL (staged). Listen for a connection
windows/patchupmeterpreter/bind_tcp_uuid                           Inject the meterpreter server DLL (staged). Listen for a connection with UUID Support (Windows x86)
windows/patchupmeterpreter/find_tag                                Inject the meterpreter server DLL (staged). Use an established connection
windows/patchupmeterpreter/reverse_ipv6_tcp                        Inject the meterpreter server DLL (staged). Connect back to the attacker over IPv6
windows/patchupmeterpreter/reverse_nonx_tcp                        Inject the meterpreter server DLL (staged). Connect back to the attacker (No NX)
windows/patchupmeterpreter/reverse_ord_tcp                         Inject the meterpreter server DLL (staged). Connect back to the attacker
windows/patchupmeterpreter/reverse_tcp                             Inject the meterpreter server DLL (staged). Connect back to the attacker
windows/patchupmeterpreter/reverse_tcp_allports                    Inject the meterpreter server DLL (staged). Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/patchupmeterpreter/reverse_tcp_dns                         Inject the meterpreter server DLL (staged). Connect back to the attacker
windows/patchupmeterpreter/reverse_tcp_rc4                         Inject the meterpreter server DLL (staged). Connect back to the attacker
windows/patchupmeterpreter/reverse_tcp_rc4_dns                     Inject the meterpreter server DLL (staged). Connect back to the attacker
windows/patchupmeterpreter/reverse_tcp_uuid                        Inject the meterpreter server DLL (staged). Connect back to the attacker with UUID Support
windows/peinject/bind_hidden_ipknock_tcp                           Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/peinject/bind_hidden_tcp                                   Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/peinject/bind_ipv6_tcp                                     Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for an IPv6 connection (Windows x86)
windows/peinject/bind_ipv6_tcp_uuid                                Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for an IPv6 connection with UUID Support (Windows x86)
windows/peinject/bind_named_pipe                                   Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a pipe connection (Windows x86)
windows/peinject/bind_nonx_tcp                                     Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection (No NX)
windows/peinject/bind_tcp                                          Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection (Windows x86)
windows/peinject/bind_tcp_rc4                                      Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection
windows/peinject/bind_tcp_uuid                                     Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection with UUID Support (Windows x86)
windows/peinject/find_tag                                          Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Use an established connection
windows/peinject/reverse_ipv6_tcp                                  Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker over IPv6
windows/peinject/reverse_named_pipe                                Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker via a named pipe pivot
windows/peinject/reverse_nonx_tcp                                  Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker (No NX)
windows/peinject/reverse_ord_tcp                                   Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/peinject/reverse_tcp                                       Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/peinject/reverse_tcp_allports                              Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/peinject/reverse_tcp_dns                                   Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/peinject/reverse_tcp_rc4                                   Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/peinject/reverse_tcp_rc4_dns                               Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/peinject/reverse_tcp_uuid                                  Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker with UUID Support
windows/pingback_bind_tcp                                          Open a socket and report UUID when a connection is received (Windows x86)
windows/pingback_reverse_tcp                                       Connect back to attacker and report UUID (Windows x86)
windows/powershell_bind_tcp                                        Listen for a connection and spawn an interactive powershell session
windows/powershell_reverse_tcp                                     Listen for a connection and spawn an interactive powershell session
windows/powershell_reverse_tcp_ssl                                 Listen for a connection and spawn an interactive powershell session over SSL
windows/shell/bind_hidden_ipknock_tcp                              Spawn a piped command shell (staged). Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/shell/bind_hidden_tcp                                      Spawn a piped command shell (staged). Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/shell/bind_ipv6_tcp                                        Spawn a piped command shell (staged). Listen for an IPv6 connection (Windows x86)
windows/shell/bind_ipv6_tcp_uuid                                   Spawn a piped command shell (staged). Listen for an IPv6 connection with UUID Support (Windows x86)
windows/shell/bind_named_pipe                                      Spawn a piped command shell (staged). Listen for a pipe connection (Windows x86)
windows/shell/bind_nonx_tcp                                        Spawn a piped command shell (staged). Listen for a connection (No NX)
windows/shell/bind_tcp                                             Spawn a piped command shell (staged). Listen for a connection (Windows x86)
windows/shell/bind_tcp_rc4                                         Spawn a piped command shell (staged). Listen for a connection
windows/shell/bind_tcp_uuid                                        Spawn a piped command shell (staged). Listen for a connection with UUID Support (Windows x86)
windows/shell/find_tag                                             Spawn a piped command shell (staged). Use an established connection
windows/shell/reverse_ipv6_tcp                                     Spawn a piped command shell (staged). Connect back to the attacker over IPv6
windows/shell/reverse_nonx_tcp                                     Spawn a piped command shell (staged). Connect back to the attacker (No NX)
windows/shell/reverse_ord_tcp                                      Spawn a piped command shell (staged). Connect back to the attacker
windows/shell/reverse_tcp                                          Spawn a piped command shell (staged). Connect back to the attacker
windows/shell/reverse_tcp_allports                                 Spawn a piped command shell (staged). Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/shell/reverse_tcp_dns                                      Spawn a piped command shell (staged). Connect back to the attacker
windows/shell/reverse_tcp_rc4                                      Spawn a piped command shell (staged). Connect back to the attacker
windows/shell/reverse_tcp_rc4_dns                                  Spawn a piped command shell (staged). Connect back to the attacker
windows/shell/reverse_tcp_uuid                                     Spawn a piped command shell (staged). Connect back to the attacker with UUID Support
windows/shell/reverse_udp                                          Spawn a piped command shell (staged). Connect back to the attacker with UUID Support
windows/shell_bind_tcp                                             Listen for a connection and spawn a command shell
windows/shell_bind_tcp_xpfw                                        Disable the Windows ICF, then listen for a connection and spawn a command shell
windows/shell_hidden_bind_tcp                                      Listen for a connection from certain IP and spawn a command shell. The shellcode will reply with a RST packet if the connections is not coming from the IP defined in AHOST. This way the port will appear as "closed" helping us to hide the shellcode.
windows/shell_reverse_tcp                                          Connect back to attacker and spawn a command shell
windows/speak_pwned                                                Causes the target to say "You Got Pwned" via the Windows Speech API
windows/upexec/bind_hidden_ipknock_tcp                             Uploads an executable and runs it (staged). Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/upexec/bind_hidden_tcp                                     Uploads an executable and runs it (staged). Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/upexec/bind_ipv6_tcp                                       Uploads an executable and runs it (staged). Listen for an IPv6 connection (Windows x86)
windows/upexec/bind_ipv6_tcp_uuid                                  Uploads an executable and runs it (staged). Listen for an IPv6 connection with UUID Support (Windows x86)
windows/upexec/bind_named_pipe                                     Uploads an executable and runs it (staged). Listen for a pipe connection (Windows x86)
windows/upexec/bind_nonx_tcp                                       Uploads an executable and runs it (staged). Listen for a connection (No NX)
windows/upexec/bind_tcp                                            Uploads an executable and runs it (staged). Listen for a connection (Windows x86)
windows/upexec/bind_tcp_rc4                                        Uploads an executable and runs it (staged). Listen for a connection
windows/upexec/bind_tcp_uuid                                       Uploads an executable and runs it (staged). Listen for a connection with UUID Support (Windows x86)
windows/upexec/find_tag                                            Uploads an executable and runs it (staged). Use an established connection
windows/upexec/reverse_ipv6_tcp                                    Uploads an executable and runs it (staged). Connect back to the attacker over IPv6
windows/upexec/reverse_nonx_tcp                                    Uploads an executable and runs it (staged). Connect back to the attacker (No NX)
windows/upexec/reverse_ord_tcp                                     Uploads an executable and runs it (staged). Connect back to the attacker
windows/upexec/reverse_tcp                                         Uploads an executable and runs it (staged). Connect back to the attacker
windows/upexec/reverse_tcp_allports                                Uploads an executable and runs it (staged). Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/upexec/reverse_tcp_dns                                     Uploads an executable and runs it (staged). Connect back to the attacker
windows/upexec/reverse_tcp_rc4                                     Uploads an executable and runs it (staged). Connect back to the attacker
windows/upexec/reverse_tcp_rc4_dns                                 Uploads an executable and runs it (staged). Connect back to the attacker
windows/upexec/reverse_tcp_uuid                                    Uploads an executable and runs it (staged). Connect back to the attacker with UUID Support
windows/upexec/reverse_udp                                         Uploads an executable and runs it (staged). Connect back to the attacker with UUID Support
windows/vncinject/bind_hidden_ipknock_tcp                          Inject a VNC Dll via a reflective loader (staged). Listen for a connection. First, the port will need to be knocked from the IP defined in KHOST. This IP will work as an authentication method (you can spoof it with tools like hping). After that you could get your shellcode from any IP. The socket will appear as "closed," thus helping to hide the shellcode
windows/vncinject/bind_hidden_tcp                                  Inject a VNC Dll via a reflective loader (staged). Listen for a connection from a hidden port and spawn a command shell to the allowed host.
windows/vncinject/bind_ipv6_tcp                                    Inject a VNC Dll via a reflective loader (staged). Listen for an IPv6 connection (Windows x86)
windows/vncinject/bind_ipv6_tcp_uuid                               Inject a VNC Dll via a reflective loader (staged). Listen for an IPv6 connection with UUID Support (Windows x86)
windows/vncinject/bind_named_pipe                                  Inject a VNC Dll via a reflective loader (staged). Listen for a pipe connection (Windows x86)
windows/vncinject/bind_nonx_tcp                                    Inject a VNC Dll via a reflective loader (staged). Listen for a connection (No NX)
windows/vncinject/bind_tcp                                         Inject a VNC Dll via a reflective loader (staged). Listen for a connection (Windows x86)
windows/vncinject/bind_tcp_rc4                                     Inject a VNC Dll via a reflective loader (staged). Listen for a connection
windows/vncinject/bind_tcp_uuid                                    Inject a VNC Dll via a reflective loader (staged). Listen for a connection with UUID Support (Windows x86)
windows/vncinject/find_tag                                         Inject a VNC Dll via a reflective loader (staged). Use an established connection
windows/vncinject/reverse_http                                     Inject a VNC Dll via a reflective loader (staged). Tunnel communication over HTTP (Windows wininet)
windows/vncinject/reverse_http_proxy_pstore                        Inject a VNC Dll via a reflective loader (staged). Tunnel communication over HTTP
windows/vncinject/reverse_ipv6_tcp                                 Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker over IPv6
windows/vncinject/reverse_nonx_tcp                                 Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker (No NX)
windows/vncinject/reverse_ord_tcp                                  Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker
windows/vncinject/reverse_tcp                                      Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker
windows/vncinject/reverse_tcp_allports                             Inject a VNC Dll via a reflective loader (staged). Try to connect back to the attacker, on all possible ports (1-65535, slowly)
windows/vncinject/reverse_tcp_dns                                  Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker
windows/vncinject/reverse_tcp_rc4                                  Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker
windows/vncinject/reverse_tcp_rc4_dns                              Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker
windows/vncinject/reverse_tcp_uuid                                 Inject a VNC Dll via a reflective loader (staged). Connect back to the attacker with UUID Support
windows/vncinject/reverse_winhttp                                  Inject a VNC Dll via a reflective loader (staged). Tunnel communication over HTTP (Windows winhttp)
windows/x64/custom/bind_ipv6_tcp                                   Custom shellcode stage. Listen for an IPv6 connection (Windows x64)
windows/x64/custom/bind_ipv6_tcp_uuid                              Custom shellcode stage. Listen for an IPv6 connection with UUID Support (Windows x64)
windows/x64/custom/bind_named_pipe                                 Custom shellcode stage. Listen for a pipe connection (Windows x64)
windows/x64/custom/bind_tcp                                        Custom shellcode stage. Listen for a connection (Windows x64)
windows/x64/custom/bind_tcp_rc4                                    Custom shellcode stage. Connect back to the attacker
windows/x64/custom/bind_tcp_uuid                                   Custom shellcode stage. Listen for a connection with UUID Support (Windows x64)
windows/x64/custom/reverse_http                                    Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
windows/x64/custom/reverse_https                                   Custom shellcode stage. Tunnel communication over HTTP (Windows x64 wininet)
windows/x64/custom/reverse_named_pipe                              Custom shellcode stage. Connect back to the attacker via a named pipe pivot
windows/x64/custom/reverse_tcp                                     Custom shellcode stage. Connect back to the attacker (Windows x64)
windows/x64/custom/reverse_tcp_rc4                                 Custom shellcode stage. Connect back to the attacker
windows/x64/custom/reverse_tcp_uuid                                Custom shellcode stage. Connect back to the attacker with UUID Support (Windows x64)
windows/x64/custom/reverse_winhttp                                 Custom shellcode stage. Tunnel communication over HTTP (Windows x64 winhttp)
windows/x64/custom/reverse_winhttps                                Custom shellcode stage. Tunnel communication over HTTPS (Windows x64 winhttp)
windows/x64/encrypted_shell/reverse_tcp                            Spawn a piped command shell (staged). Connect to MSF and read in stage
windows/x64/encrypted_shell_reverse_tcp                            Connect back to attacker and spawn an encrypted command shell
windows/x64/exec                                                   Execute an arbitrary command (Windows x64)
windows/x64/loadlibrary                                            Load an arbitrary x64 library path
windows/x64/messagebox                                             Spawn a dialog via MessageBox using a customizable title, text & icon
windows/x64/meterpreter/bind_ipv6_tcp                              Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for an IPv6 connection (Windows x64)
windows/x64/meterpreter/bind_ipv6_tcp_uuid                         Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for an IPv6 connection with UUID Support (Windows x64)
windows/x64/meterpreter/bind_named_pipe                            Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a pipe connection (Windows x64)
windows/x64/meterpreter/bind_tcp                                   Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection (Windows x64)
windows/x64/meterpreter/bind_tcp_rc4                               Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/x64/meterpreter/bind_tcp_uuid                              Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Listen for a connection with UUID Support (Windows x64)
windows/x64/meterpreter/reverse_http                               Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTP (Windows x64 wininet)
windows/x64/meterpreter/reverse_https                              Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTP (Windows x64 wininet)
windows/x64/meterpreter/reverse_named_pipe                         Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker via a named pipe pivot
windows/x64/meterpreter/reverse_tcp                                Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker (Windows x64)
windows/x64/meterpreter/reverse_tcp_rc4                            Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker
windows/x64/meterpreter/reverse_tcp_uuid                           Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Connect back to the attacker with UUID Support (Windows x64)
windows/x64/meterpreter/reverse_winhttp                            Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTP (Windows x64 winhttp)
windows/x64/meterpreter/reverse_winhttps                           Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer. Tunnel communication over HTTPS (Windows x64 winhttp)
windows/x64/meterpreter_bind_named_pipe                            Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/x64/meterpreter_bind_tcp                                   Connect to victim and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/x64/meterpreter_reverse_http                               Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/x64/meterpreter_reverse_https                              Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/x64/meterpreter_reverse_ipv6_tcp                           Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/x64/meterpreter_reverse_tcp                                Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
windows/x64/peinject/bind_ipv6_tcp                                 Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for an IPv6 connection (Windows x64)
windows/x64/peinject/bind_ipv6_tcp_uuid                            Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for an IPv6 connection with UUID Support (Windows x64)
windows/x64/peinject/bind_named_pipe                               Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a pipe connection (Windows x64)
windows/x64/peinject/bind_tcp                                      Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection (Windows x64)
windows/x64/peinject/bind_tcp_rc4                                  Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/x64/peinject/bind_tcp_uuid                                 Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Listen for a connection with UUID Support (Windows x64)
windows/x64/peinject/reverse_named_pipe                            Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker via a named pipe pivot
windows/x64/peinject/reverse_tcp                                   Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker (Windows x64)
windows/x64/peinject/reverse_tcp_rc4                               Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker
windows/x64/peinject/reverse_tcp_uuid                              Inject a custom native PE file into the exploited process using a reflective PE loader. The reflective PE loader will execute the pre-mapped PE image starting from the address of entry after performing image base relocation and API address resolution. This module requires a PE file that contains relocation data and a valid (uncorrupted) import table. PE files with CLR(C#/.NET executables), bounded imports, and TLS callbacks are not currently supported. Also PE files which use resource loading might crash. Connect back to the attacker with UUID Support (Windows x64)
windows/x64/pingback_reverse_tcp                                   Connect back to attacker and report UUID (Windows x64)
windows/x64/powershell_bind_tcp                                    Listen for a connection and spawn an interactive powershell session
windows/x64/powershell_reverse_tcp                                 Listen for a connection and spawn an interactive powershell session
windows/x64/powershell_reverse_tcp_ssl                             Listen for a connection and spawn an interactive powershell session over SSL
windows/x64/shell/bind_ipv6_tcp                                    Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
windows/x64/shell/bind_ipv6_tcp_uuid                               Spawn a piped command shell (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
windows/x64/shell/bind_named_pipe                                  Spawn a piped command shell (Windows x64) (staged). Listen for a pipe connection (Windows x64)
windows/x64/shell/bind_tcp                                         Spawn a piped command shell (Windows x64) (staged). Listen for a connection (Windows x64)
windows/x64/shell/bind_tcp_rc4                                     Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
windows/x64/shell/bind_tcp_uuid                                    Spawn a piped command shell (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
windows/x64/shell/reverse_tcp                                      Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker (Windows x64)
windows/x64/shell/reverse_tcp_rc4                                  Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker
windows/x64/shell/reverse_tcp_uuid                                 Spawn a piped command shell (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
windows/x64/shell_bind_tcp                                         Listen for a connection and spawn a command shell (Windows x64)
windows/x64/shell_reverse_tcp                                      Connect back to attacker and spawn a command shell (Windows x64)
windows/x64/vncinject/bind_ipv6_tcp                                Inject a VNC Dll via a reflective loader (Windows x64) (staged). Listen for an IPv6 connection (Windows x64)
windows/x64/vncinject/bind_ipv6_tcp_uuid                           Inject a VNC Dll via a reflective loader (Windows x64) (staged). Listen for an IPv6 connection with UUID Support (Windows x64)
windows/x64/vncinject/bind_named_pipe                              Inject a VNC Dll via a reflective loader (Windows x64) (staged). Listen for a pipe connection (Windows x64)
windows/x64/vncinject/bind_tcp                                     Inject a VNC Dll via a reflective loader (Windows x64) (staged). Listen for a connection (Windows x64)
windows/x64/vncinject/bind_tcp_rc4                                 Inject a VNC Dll via a reflective loader (Windows x64) (staged). Connect back to the attacker
windows/x64/vncinject/bind_tcp_uuid                                Inject a VNC Dll via a reflective loader (Windows x64) (staged). Listen for a connection with UUID Support (Windows x64)
windows/x64/vncinject/reverse_http                                 Inject a VNC Dll via a reflective loader (Windows x64) (staged). Tunnel communication over HTTP (Windows x64 wininet)
windows/x64/vncinject/reverse_https                                Inject a VNC Dll via a reflective loader (Windows x64) (staged). Tunnel communication over HTTP (Windows x64 wininet)
windows/x64/vncinject/reverse_tcp                                  Inject a VNC Dll via a reflective loader (Windows x64) (staged). Connect back to the attacker (Windows x64)
windows/x64/vncinject/reverse_tcp_rc4                              Inject a VNC Dll via a reflective loader (Windows x64) (staged). Connect back to the attacker
windows/x64/vncinject/reverse_tcp_uuid                             Inject a VNC Dll via a reflective loader (Windows x64) (staged). Connect back to the attacker with UUID Support (Windows x64)
windows/x64/vncinject/reverse_winhttp                              Inject a VNC Dll via a reflective loader (Windows x64) (staged). Tunnel communication over HTTP (Windows x64 winhttp)
windows/x64/vncinject/reverse_winhttps                             Inject a VNC Dll via a reflective loader (Windows x64) (staged). Tunnel communication over HTTPS (Windows x64 winhttp)