Updates ps1encode : Script used to generate and encode a PowerShell based Metasploit payloads.

Updates ps1encode : Script used to generate and encode a PowerShell based Metasploit payloads.

Changelog v20/11/2015:
+ adding obfuscation to VBA Signature based spam filters (seen in gmail and office365) flag macros with the word “powershell”. Splitting up the string into “power” and “shell.exe”

Use to generate and encode a powershell based metasploit payloads.ps1encode

Available output types:
=> raw (encoded payload only – no powershell run options)
=> cmd (for use with bat files)
=> vba (for use with macro trojan docs) < developed in conjunction with Ryan Reynolds
=> war (tomcat) < developed in conjuntion with Tony James
=> exe (executable) requires MinGW – i586-mingw32msvc-gcc [apt-get install mingw32]
=> java (for use with malicious java applets)
=> php (for use with php pages)
=> hta (HTML applications)
=> cfm (for use with Adobe ColdFusion)

ps1encode Script:

Source : https://github.com/CroweCybersecurity | Our Post Before