Metasploit Commands

Absolutely! Here's a Metasploit Cheatsheet to help you quickly reference common commands and workflows. It’s divided into key sections:


🧠 Metasploit Cheatsheet

πŸ”§ Starting & Stopping

msfconsole           # Start Metasploit Framework Console
msfupdate            # Update Metasploit

πŸ” Search & Use Modules

search <keyword>                     # Search for modules (e.g., search smb)
use <path/to/module>                # Use a specific module (e.g., use exploit/windows/smb/ms17_010_eternalblue)
info                                # Show info about the selected module

βš™οΈ Setting Options

show options                        # Show required/available options for the module
set RHOST <target_ip>              # Set the target IP address
set RPORT <port>                   # Set the remote port (default varies per exploit)
set LHOST <your_ip>                # Set local (attacker) IP address
set LPORT <port>                   # Set local (attacker) port
set PAYLOAD <payload_name>        # Set a specific payload

πŸš€ Running the Exploit


🧬 Payloads


πŸ–₯ Meterpreter Session Basics


πŸ’» Meterpreter Commands


πŸ§ͺ Post-Exploitation


🧰 Auxiliary Modules


πŸ“¦ Exploit/Payload Generation (with msfvenom)


Would you like a printable PDF version or a version formatted for terminal viewing?

Last updated