by CroweCybersecurity

CroweCybersecurity / ps1encode

Script used to generate and encode a PowerShell based Metasploit payloads.

219 Stars 86 Forks Last release: Not found MIT License 41 Commits 0 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:


Use to generate and encode a powershell based metasploit payloads.

Writen by Piotr Marszalik - @addenial - peter.mars[at] - orginal version - 05/08/2013

Available output types: - raw (encoded payload only - no powershell run options) - cmd (for use with bat files) - vba (for use with macro trojan docs) - vbs (for use with vbs scripts) - war (tomcat) - exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64] - java (for use with malicious java applets) - js (javascript) - js-rd32 (javascript called by rundll32.exe) - php (for use with php pages) - hta (HTML applications) - cfm (for use with Adobe ColdFusion) - aspx (for use with Microsoft ASP.NET) - lnk (windows shortcut - requires a webserver to stage the payload) - sct (COM scriptlet - requires a webserver to stage the payload)

Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy


We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.