ps1encode

by CroweCybersecurity

CroweCybersecurity / ps1encode

Script used to generate and encode a PowerShell based Metasploit payloads.

219 Stars 86 Forks Last release: Not found MIT License 41 Commits 0 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

ps1encode

Use to generate and encode a powershell based metasploit payloads.

Writen by Piotr Marszalik - @addenial - peter.mars[at]outlook.com - orginal version - 05/08/2013

Available output types: - raw (encoded payload only - no powershell run options) - cmd (for use with bat files) - vba (for use with macro trojan docs) - vbs (for use with vbs scripts) - war (tomcat) - exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64] - java (for use with malicious java applets) - js (javascript) - js-rd32 (javascript called by rundll32.exe) - php (for use with php pages) - hta (HTML applications) - cfm (for use with Adobe ColdFusion) - aspx (for use with Microsoft ASP.NET) - lnk (windows shortcut - requires a webserver to stage the payload) - sct (COM scriptlet - requires a webserver to stage the payload)

Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy

DETAILS: * https://rvnsec.wordpress.com/2014/09/01/ps1encode-powershell-for-days/ * https://rvnsec.wordpress.com/2015/12/18/shell-party-continues/

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.