module
Powershell Exec, Windows Meterpreter Shell, Reverse TCP Inline (IPv6) (x64)
| Disclosed |
|---|
| N/A |
Disclosed
N/A
Description
Execute an x64 payload from a command via PowerShell. Connect back to attacker and spawn a Meterpreter shell. Requires Windows XP SP2 or newer.
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.