Commit Graph

9 Commits

Author SHA1 Message Date
Tim W 9733ced0e4 cleanup and move LOAD_MODULES option to Msf::Payload::Windows::Powershell 2021-11-30 07:06:11 +00:00
Tim W 1c87495a4a fix ssl payload 2021-11-30 06:30:58 +00:00
Tim W 9097b181b0 add powershell_reverse_tcp_ssl 2021-11-30 06:30:58 +00:00
dwelch-r7 1617b3ec9b Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
Auxilus 26b2ec3d84 remove spaces at EOL 2020-03-24 18:08:34 +05:30
bwatters-r7 658267849b deconflict the method names in mix-ins 2018-07-19 17:01:40 -05:00
RageLtMan 124a1531f4 Clean up powershell exec string
The scriptblock invocation is already coming from Rex, so there's
no need to re-wrap the executed code in more of the same.
2017-10-06 13:19:36 -04:00
RageLtMan 9afdde2938 Address generation issues with pure PSH payloads
Powershell payloads were generating using the :generate method
mixed in from Payload::Windows::Exec which is a binary payload
mixin.

Address the breakage by implementing a generate method which simply
outputs the script code produced by the module with no additional
content prepended or appended.

While here, cleanup the commandline generation for the script being
produced by having Rex do it (this permits changes made in Rex to
benefit all consumers).

As a bonus, drop the IEX invocation since it'll trip up AMSI and
upgrade to the scripblock execution semantic.

Credit for finding this little gem goes to bperry - i dont usually
use the native powershell command shells, and managed to miss this
for a long time. Thanks boss.

Testing:
  Local in pry

@bperry: Could you test and ping me back if this is right?
2017-10-06 12:32:52 -04:00
benpturner 1f294eac0b Updated to remove dup code 2015-05-13 17:26:21 +01:00