XECA : PowerShell Payload Generator

XECA is a project that creates encrypted PowerShell payloads for offensive purposes. Creating position independent shellcode from DLL files is also possible.

Install

Firstly ensure that rust is installed, then build the project with the following command:

cargo build

How It Works?

  • Identify and encrypt the payload. Load encrypted payload into a powershell script and save to a file named “launch.txt”
  • The key to decrypt the payload is saved to a file named “safe.txt”
  • Execute “launch.txt” on a remote host
    • The script will call back to the attacker defined web server to retrieve the decryption key “safe.txt”
    • Decrypt the payload in memory
    • Execute the intended payload in memory

Mitigations

If users must have access to programs such as powershell.exe, consider minimising security risks with Just Enough Administration and PowerShell Logging. Application control policies can be deployed via a whitelisting technology such as AppLocker.

Mitigations

If users must have access to programs such as powershell.exe, consider minimising security risks with Just Enough Administration and PowerShell Logging. Application control policies can be deployed via a whitelisting technology such as Ap pLocker.

Acknowledgements

This tool would not be possible without the sharing of knowledge and information. Ideas, snippets and code from the following authors should be acknowledged:
@monoxgas
@H0neyBadger
@stephenfewer
@dismantl

License

xeca is licensed under GPLv3, some sub-components may have separate licenses. See their respective references in this project for details.

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

6 hours ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

6 hours ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

1 day ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

2 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

3 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

3 days ago