Need help with ps1encode?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

247 Stars 90 Forks MIT License 41 Commits 1 Opened issues


Script used to generate and encode a PowerShell based Metasploit payloads.

Services available


Need anything else?

Contributors list


Use to generate and encode a powershell based metasploit payloads.

Writen by Piotr Marszalik - @addenial - peter.mars[at] - orginal version - 05/08/2013

Available output types: - raw (encoded payload only - no powershell run options) - cmd (for use with bat files) - vba (for use with macro trojan docs) - vbs (for use with vbs scripts) - war (tomcat) - exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64] - java (for use with malicious java applets) - js (javascript) - js-rd32 (javascript called by rundll32.exe) - php (for use with php pages) - hta (HTML applications) - cfm (for use with Adobe ColdFusion) - aspx (for use with Microsoft ASP.NET) - lnk (windows shortcut - requires a webserver to stage the payload) - sct (COM scriptlet - requires a webserver to stage the payload)

Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy


We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.