When using metasploit with my python reverse shell script I get a byte error, but it seems to work fine when using a netcat listener
When I run my python script and use netcat -nvlp 4444 the connection establishes fine and I am able to use the functions.
When attempting to replicate this in metasploit I use set payload windows/x64/shell/reverse_tcp then I set the LHOS… Continue reading When using metasploit with my python reverse shell script I get a byte error, but it seems to work fine when using a netcat listener