itsMe Posted July 24, 2020 Share Posted July 24, 2020 This is the hidden content, please Sign In or Sign Up xeca xeca is a project that creates encrypted PowerShell payloads for offensive purposes. Creating position independent shellcode from DLL files is also possible. How It Works Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt” The key to decrypt the payload is saved to a file named “safe.txt” Execute “launch.txt” on a remote host The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt” Decrypt the payload in memory Execute the intended payload in memory This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts