PowerShell payload generator
xeca is a project that creates encrypted PowerShell payloads for offensive purposes.
Creating position independent shellcode from DLL files is also possible.
Note: Please place your custom AMSI bypass in src/assets/amsi-bypass.ps1
.
Firstly ensure that rust is installed, then build the project with the following command:
cargo build
If users must have access to programs such as powershell.exe, consider minimising security risks with Just Enough Administration and PowerShell Logging. Application control policies can be deployed via a whitelisting technology such as AppLocker.
Covenant .NET assembly donut payload.
Empire PowerShell payload.
Merlin DLL payload.
Sliver Shellcode payload.
This tool would not be possible without the sharing of knowledge and information. Ideas, snippets and code from the following authors should be acknowledged:
@monoxgas
@H0neyBadger
@TheWover
@stephenfewer
@dismantl
@tandasat
@cobbr
xeca is licensed under GPLv3, some sub-components may have separate licenses. See their respective references in this project for details.