PSHinjector
PSHinjector autoscript is a tool that inject shellcode(x64 payload) by powershell with python3 programing
Install / Use
/learn @TaroballzChen/PSHinjectorREADME
PSHinjector
PSHinjector autoscript is a tool that inject shellcode(x64 payload) by powershell with python3 programing
PSHinjector是一個由python3編寫的工具,可載入客製Metasploit生成的powershell格式的raw檔(須為x64_rev_https或x64_rev_http)並使用PS1toEXE封裝或是您也可使用本工具生成普通的raw檔再進行封裝。
提取powershell empire專案中shellcode注入模塊將Metasploit生成的shellcode注入
且本工具亦提取Invoke-Obfuscation專案的powershell代碼混淆模塊對powershell代碼混淆
您也可使用python3.HttpServer將生成的payload放置output文件夾中,並讓受害者執行此工具生成的語句獲得會話

Basic Flow
- Example 1
- msfvenom 產生raw檔
- sc 引入powershell格式raw檔
- og 合併powershell文件
- exe 模塊封裝
- msf 模塊監聽
- Example 2
- sc 模塊產生普通raw檔
- og 合併powershell文件
- ob 混淆powershell代碼
- web 開啟HttpServer等待下載語句
- msf 模塊監聽
- Example 3
- sc 模塊產生普通raw檔
- og 合併powershell文件
- exe 模塊封裝
- msf 模塊監聽
還有更多使用方法可以發掘
Requirements
python3
Installation
$ git clone https://github.com/curtis992250/PSHinjector.git
- 最新的Kali 2020 需手動安裝gedit & gnome-terminal
apt-get update
apt-get install gedit
apt-get install gnome-terminal
Usage
$ python3 pshinjector.py
Reference
- https://github.com/curtis992250/powerpreter_toolkit
- https://github.com/Mr-Un1k0d3r/DKMC
- https://github.com/EmpireProject/Empire
- https://github.com/rzander/PS2EXE
- https://github.com/aravindvcyber/PS1toEXE
- https://github.com/danielbohannon/Invoke-Obfuscation
Related Skills
node-connect
348.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
108.8kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
348.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
348.0kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。

