diff options
author | bitform <matt@exploit-monday.com> | 2012-08-20 20:14:01 -0400 |
---|---|---|
committer | bitform <matt@exploit-monday.com> | 2012-08-20 20:14:01 -0400 |
commit | c7fa3390128cfc3e5a3ad74c62970c3ee0f9fd5c (patch) | |
tree | eff3fc4f0068884375d24b8e56eb8c845ed1b0d5 /Encrypt-Script.ps1 | |
parent | 2b5ac68b9c230fdcf03ef9cc6a3844f9a2726ac6 (diff) | |
download | PowerSploit-c7fa3390128cfc3e5a3ad74c62970c3ee0f9fd5c.tar.gz PowerSploit-c7fa3390128cfc3e5a3ad74c62970c3ee0f9fd5c.zip |
Updated Inject-Shellcode and style guide
New Features/Changes:
- Dramatically simplified parameters. Removed redundancies and named
parameter sets more appropriately
- Added 'Shellcode' parameter. Now, you can optionally specify shellcode
as a byte array rather than having to copy and paste shellcode into the
$Shellcode32 and/or $Shellcode64 variables
- Added 'Payload' parameter. Naming is now consistant with Metasploit
payloads. Currently, only 'windows/meterpreter/reverse_http' and
'windows/meterpreter/reverse_https' payloads are supported.
- Inject-Shellcode will now prompt the user to continue the 'dangerous'
action unless the -Force switch is provided. Hopefully, this will
prevent some people from carrying out stupid/regrettable actions.
- Added the 'ListMetasploitPayloads' switch to display the Metasploit
payloads supported by Inject-Shellcode
Bug fixes/Miscellaneous:
- Added UserAgent parameter to help documentation
- Code is much more readable now
- Changed internal helper functions to 'local' scope
- Now using proper error handling versus Write-Warning statements
- Added a subtle warning to the built-in shellcode...
Diffstat (limited to 'Encrypt-Script.ps1')
0 files changed, 0 insertions, 0 deletions