CroweCybersecurity/ps1encode: Script used to generate and encode a PowerShell based Metasploit payloads.
2019-07-11 23:13:50 Author: github.com(查看原文) 阅读量:247 收藏

Join GitHub today

GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.

Sign up

Script used to generate and encode a PowerShell based Metasploit payloads.

Use to generate and encode a powershell based metasploit payloads.

Writen by Piotr Marszalik - @addenial - peter.mars[at]outlook.com

  • orginal version - 05/08/2013

Available output types:

  • raw (encoded payload only - no powershell run options)
  • cmd (for use with bat files)
  • vba (for use with macro trojan docs)
  • vbs (for use with vbs scripts)
  • war (tomcat)
  • exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64]
  • java (for use with malicious java applets)
  • js (javascript)
  • js-rd32 (javascript called by rundll32.exe)
  • php (for use with php pages)
  • hta (HTML applications)
  • cfm (for use with Adobe ColdFusion)
  • aspx (for use with Microsoft ASP.NET)
  • lnk (windows shortcut - requires a webserver to stage the payload)
  • sct (COM scriptlet - requires a webserver to stage the payload)

Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy

DETAILS:


文章来源: https://github.com/CroweCybersecurity/ps1encode
如有侵权请联系:admin#unsafe.sh