• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

xeca v0.3 - creates encrypted PowerShell payloads for offensive purposes

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,607
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,590
‎6 Years of Service‎
 
76%
screenshot-163.png


xeca is a project that creates encrypted PowerShell payloads for offensive purposes.

Creating position independent shellcode from DLL files is also possible.

How It Works

    Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt”
    The key to decrypt the payload is saved to a file named “safe.txt”
    Execute “launch.txt” on a remote host
        The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt”
        Decrypt the payload in memory
        Execute the intended payload in memory

Changelog v0.3

    ETW and Script Block Logging bypass added to all payloads.
    The bypasses can be disabled with –disable-etw and –disable-script-logging.


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top