Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
First i'm getting a problem even when i try to execute the obfuscated powershell payload on my Windows 10 x64 Pro Machine. It's not executing correctly. I have to turn off Windows Defender and execute the payload otherwise i won't get a session back.
But Windows Defender is not picking up the payload it's not detecting the powershell injection.
Running Powershell before executing the payload.
Executing the Payload in Powershell.
Started Handler and waiting for connections.
After turning off Windows Defender the payload gets executed... but it opens multiple powershell instances.
Getting Meterpreter Session opened with URI unescape warning...
Hi,
I'm having problems with unicor... i'm getting an URI unescape warning after the Meterpreter session opened and can only "exit -y" to stop it.
Unicorn version used: Newest. Just did a git clone a few hours ago.
Payload: windows/meterpreter/reverse_http Lhost: 192.168.178.26 Lport: 11111
First i'm getting a problem even when i try to execute the obfuscated powershell payload on my Windows 10 x64 Pro Machine. It's not executing correctly. I have to turn off Windows Defender and execute the payload otherwise i won't get a session back. But Windows Defender is not picking up the payload it's not detecting the powershell injection.
Running Powershell before executing the payload. Executing the Payload in Powershell. Started Handler and waiting for connections. After turning off Windows Defender the payload gets executed... but it opens multiple powershell instances. Getting Meterpreter Session opened with URI unescape warning...
Thank You in advance for any help!