mirror of
https://github.com/rapid7/metasploit-payloads
synced 2024-12-21 05:35:54 +01:00
7ba39c982a
More to do, including reading of TLV packets.
27 lines
735 B
C#
Executable File
27 lines
735 B
C#
Executable File
using MSF.Powershell;
|
|
using MSF.Powershell.Meterpreter;
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.Text;
|
|
|
|
namespace MSF.PowershellTester
|
|
{
|
|
class Program
|
|
{
|
|
static void Main(string[] args)
|
|
{
|
|
//var x = MSF.Powershell.Runner.Get("Default");
|
|
//System.Console.Write(x.Execute("$x = $(whoami)"));
|
|
//System.Console.Write(x.Execute("$x"));
|
|
//MSF.Powershell.Runner.Remove("Default");
|
|
|
|
Tlv t = new Tlv();
|
|
t.Pack(TlvType.ElevateTechnique, 1);
|
|
t.Pack(TlvType.ElevateServiceName, "abcd1234");
|
|
|
|
var x = t.ToRequest("priv_elevate_getsystem");
|
|
var y = 0;
|
|
}
|
|
}
|
|
}
|