This article explains how to develop an exploit code using Metasploit on Kali Linux to hack into a victim's Windows operating system without physically logging in. The article covers the requirements, commands, and activities that can be done on the victim's machine. The article is relevant to ICT Ethical Hacking courses and students interested in cybersecurity.