1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-01-14 17:37:27 +01:00
metasploit-payloads/powershell/MSF.Powershell/MSF.PowershellTester/Program.cs

26 lines
670 B
C#
Executable File

using MSF.Powershell;
using System;
using System.Collections.Generic;
using System.Text;
namespace MSF.PowershellTester
{
class Program
{
static void Main(string[] args)
{
//var x = MSF.Powershell.Runner.Get("Default");
//System.Console.Write(x.Execute("$x = $(whoami)"));
//System.Console.Write(x.Execute("$x"));
//MSF.Powershell.Runner.Remove("Default");
Tlv t = new Tlv();
t.Pack(TlvType.ElevateTechnique, 1);
t.Pack(TlvType.ElevateServiceName, "abcd1234");
var x = t.Bytes;
var y = 0;
}
}
}