1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-12-21 05:35:54 +01:00
metasploit-payloads/powershell/MSF.Powershell/MSF.PowershellTester/Program.cs
OJ 7ba39c982a First version of "working" bindings (getsystem works)
More to do, including reading of TLV packets.
2016-03-23 13:39:25 +10:00

27 lines
735 B
C#
Executable File

using MSF.Powershell;
using MSF.Powershell.Meterpreter;
using System;
using System.Collections.Generic;
using System.Text;
namespace MSF.PowershellTester
{
class Program
{
static void Main(string[] args)
{
//var x = MSF.Powershell.Runner.Get("Default");
//System.Console.Write(x.Execute("$x = $(whoami)"));
//System.Console.Write(x.Execute("$x"));
//MSF.Powershell.Runner.Remove("Default");
Tlv t = new Tlv();
t.Pack(TlvType.ElevateTechnique, 1);
t.Pack(TlvType.ElevateServiceName, "abcd1234");
var x = t.ToRequest("priv_elevate_getsystem");
var y = 0;
}
}
}