For windows victim machine
Method 1: using rlwrap command
While you can capture a reverse shell using rlwrap on both Windows and Linux machines, I prefer this command for Windows, though I’m not sure why. 😂
Run your payload to get a shell and capture the request using rlwrap and nc.
# Catch the reverse shell using the below command.
sudo rlwrap nc -lnvp $PortNumberLast updated