Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      PowerShell

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This project is a simple collection of various shellcode injection techniques, aiming to streamline the process of endpoint detection evaluation, besides challenging myself to get into the Golang world.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Features
              Connection is encrypted using random RSA + AES key
              Multiple clients support
              Execute shell commands
              Download/Upload files
              Take screenshot
              Cross platform


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HTTP-revshell - Powershell Reverse Shell Using HTTP/S Protocol With AMSI Bypass And Proxy Aware
          HTTP-revshell is a tool focused on redteam exercises and pentesters. This tool provides a reverse connection through the http/s protocol. It use a covert channel to gain control over the victim machine through web requests and thus evade solutions such as IDS, IPS and AV.
          Features
              SSL
              Proxy Aware
              Upload Function
              Download Function
              Error Control
              AMSI bypass
              Multiple sessions [only server-multisession.py]
              Autocomplete PowerShell functions (optional) [only server.py]


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. xeca
          xeca is a project that creates encrypted PowerShell payloads for offensive purposes.
          Creating position independent shellcode from DLL files is also possible.
          How It Works
              Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt”
              The key to decrypt the payload is saved to a file named “safe.txt”
              Execute “launch.txt” on a remote host
                  The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt”
                  Decrypt the payload in memory
                  Execute the intended payload in memory

          Hidden Content
          Give reaction to this post to see the hidden content.