Skip to content

Latest commit

 

History

History
11 lines (10 loc) · 318 Bytes

File metadata and controls

11 lines (10 loc) · 318 Bytes

Usage

Just run the powershell_rv.py then just input the LHOST and LPORT and the payload will be generated.

Example

C:\Users\breaching\Desktop> py .\powershell_rv.py
LHOST: 192.168.0.30
LPORT: 4444
Here is your payload: {PAYLOAD}

Note The powershell_rv.py file might flag Windows Defender tho.