- 不合理使用此脚本所提供的功能而造成的任何直接或者间接的后果及损失, 均由使用者本人负责,即刻安全以及创作者不为此承担任何责任。
Any direct or indirect consequences and losses arising from the abuse of the featuress provided by those scripts are due to the user himself, secist and the author does not accept any responsibility.
-
此款工具借鉴了以下优秀的开源项目或者工具:
This tool based on following excellent open source works:-
https://github.com/CroweCybersecurity/ps1encode => ps1encode
-
https://github.com/M4sc3r4n0/avoidz =>avoidz
-
web_delivery => msf
-
Invoke => powershell
-
git clone https://github.com/demonsec666/secist_script.git
-
cd secist_script
-
sudo chmod -R 777
-
./setup.sh
-
./secist_script.sh
-
http://tdm-gcc.tdragon.net/download
-
http://www.ggsec.cn/MSF8-0.html
echo -e "\ndeb http://us.archive.ubuntu.com/ubuntu trusty main universe" >>/etc/apt/sources.list
apt-get update && apt-get install mingw32
secist 7
< avoidz Payload >
--------------------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||
+------------++-------------------------+ -----------------------+ 即刻安全周年庆版v1.6 (secist----2017.7.14)
你的IP地址 :192.168.1.103
系统版本 :Kali GNU/Linux Rolling \n \l
+------------++-------------------------+-----------------------+
[1] Meterpreter_Reverse_tcp [5] Shell_reverse_tcp
[2] Meterpreter_Reverse_http [6] Powershell_reverse_tcp
[3] Meterpreter_Reverse_https [7] Multi encode payload
[4] Meterpreter_Reverse_tcp_dns [8] exit
[9] back meun
secist> 1
secist>请输入你的ip地址: 192.168.1.103
secist>请输入你的端口: 4444
请稍等几分钟,您的烤鱼即将出炉=====================================》 ##################################################################
Tool To bypass most A.V - dev-labs
- 即刻安全(Secist Sec)
- ----> Demon
- 个人博客(Personal Blog)
- ---->www.ggsec.cn
- 英文翻译(English translator)
- ---->KIM
- 团队博客(Team Blog)
- ---->www.secist.com
- Metasploit 系列教程(Metaploit Tutorial)
- Metasploit 系列教程 第八课(Metaploit Tutorial 8)
+即刻安全纯技术交流群:307283889