1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-12-27 08:33:43 +01:00
metasploit-payloads/powershell/MSF.Powershell/MSF.PowershellTester/Program.cs

27 lines
735 B
C#
Raw Normal View History

using MSF.Powershell;
using MSF.Powershell.Meterpreter;
using System;
2016-03-22 04:11:49 +01:00
using System.Collections.Generic;
using System.Text;
namespace MSF.PowershellTester
{
class Program
{
static void Main(string[] args)
{
//var x = MSF.Powershell.Runner.Get("Default");
//System.Console.Write(x.Execute("$x = $(whoami)"));
//System.Console.Write(x.Execute("$x"));
//MSF.Powershell.Runner.Remove("Default");
Tlv t = new Tlv();
t.Pack(TlvType.ElevateTechnique, 1);
t.Pack(TlvType.ElevateServiceName, "abcd1234");
var x = t.ToRequest("priv_elevate_getsystem");
var y = 0;
2016-03-22 04:11:49 +01:00
}
}
}