Input:
- Which command line to use (command prompt or powershell)
- time delay after which payload will run
- Payload that is to be executed in the background
The payload can be any payload
can be a harmless rickroll payload can be a payload that connects to a hacker's computer with reverse-shell
Possibilities of the payload are endless , SKY IS THE LIMIT