Skip to content
master
Go to file
Code

Latest commit

Added option to specify compiling 32 bit executable
68d7778

Git stats

Files

Permalink
Failed to load latest commit information.

README.md

ps1encode

Use to generate and encode a powershell based metasploit payloads.

Writen by Piotr Marszalik - @addenial - peter.mars[at]outlook.com

  • orginal version - 05/08/2013

Available output types:

  • raw (encoded payload only - no powershell run options)
  • cmd (for use with bat files)
  • vba (for use with macro trojan docs)
  • vbs (for use with vbs scripts)
  • war (tomcat)
  • exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64]
  • java (for use with malicious java applets)
  • js (javascript)
  • js-rd32 (javascript called by rundll32.exe)
  • php (for use with php pages)
  • hta (HTML applications)
  • cfm (for use with Adobe ColdFusion)
  • aspx (for use with Microsoft ASP.NET)
  • lnk (windows shortcut - requires a webserver to stage the payload)
  • sct (COM scriptlet - requires a webserver to stage the payload)

Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy

DETAILS:

About

Script used to generate and encode a PowerShell based Metasploit payloads.

Resources

License

Releases

No releases published

Packages

No packages published

Languages

You can’t perform that action at this time.