.. / msfvenom_rev_sh
Star

Metasploit way to generate a reverse shell.

Command Reference:

Payload: The payload to generate, such as “linux/x64/shell_reverse_tcp”

Listening Host: Your machine, used to listen for incoming connections

Listening Port: Port on which you are listening for connections

Format: Executable format, like “elf” (not always needed)

Output file: Executable to run on target (Executable type is set with -f (format))

Command: Copy References: