Writen by Piotr Marszalik - @addenial - peter.mars[at]outlook.com
- orginal version - 05/08/2013
Available output types:
- raw (encoded payload only - no powershell run options)
- cmd (for use with bat files)
- vba (for use with macro trojan docs)
- vbs (for use with vbs scripts)
- war (tomcat)
- exe (executable) requires MinGW - i586-mingw32msvc-gcc [apt-get install mingw32]
- java (for use with malicious java applets)
- js (javascript)
- php (for use with php pages)
- hta (HTML applications)
- cfm (for use with Adobe ColdFusion)
- aspx (for use with Microsoft ASP.NET)
- lnk (windows shortcut - requires a website to stage the payload)
Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy
DETAILS: