Need help with ps1encode?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

CroweCybersecurity
233 Stars 89 Forks MIT License 41 Commits 1 Opened issues

Description

Script used to generate and encode a PowerShell based Metasploit payloads.

Services available

!
?

Need anything else?

Contributors list

# 119,222
Ruby
actived...
red-tea...
Shell
28 commits
# 25,054
Python
Shell
Less
man-in-...
3 commits
# 570,301
Ruby
HTML
1 commit

ps1encode

Use to generate and encode a powershell based metasploit payloads.

Writen by Piotr Marszalik - @addenial - peter.mars[at]outlook.com - orginal version - 05/08/2013

Available output types: - raw (encoded payload only - no powershell run options) - cmd (for use with bat files) - vba (for use with macro trojan docs) - vbs (for use with vbs scripts) - war (tomcat) - exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64] - java (for use with malicious java applets) - js (javascript) - js-rd32 (javascript called by rundll32.exe) - php (for use with php pages) - hta (HTML applications) - cfm (for use with Adobe ColdFusion) - aspx (for use with Microsoft ASP.NET) - lnk (windows shortcut - requires a webserver to stage the payload) - sct (COM scriptlet - requires a webserver to stage the payload)

Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy

DETAILS: * https://rvnsec.wordpress.com/2014/09/01/ps1encode-powershell-for-days/ * https://rvnsec.wordpress.com/2015/12/18/shell-party-continues/

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.