Attack payload examples for educational purposes only
RSHELL ( Reverse Shell ): STEP-1 First, Attacker PC must be listening to the upcoming request,to accomplish this we use the LISTENER.py script which listens to port 8081 on localhost // IP and port changeable.
STEP2- Execute RSHELL.py (reverse shell) payload in victim machine.
STEP3- Accessing the victim's machine by RSHELL payload we are in the victim's shell now and execute some commands on the attacker's pc within the victim's shell.