mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-11-28 07:20:25 +00:00
Removed older encodings and some wording
This commit is contained in:
parent
5f76c9a477
commit
0bdf588941
2 changed files with 8 additions and 32 deletions
|
@ -13,22 +13,10 @@ def encoder_type(encode):
|
|||
|
||||
return {
|
||||
'0':"",
|
||||
'1':"avoid_utf8_tolower",
|
||||
'2':"shikata_ga_nai",
|
||||
'3':"alpha_mixed",
|
||||
'4':"alpha_upper",
|
||||
'5':"call4_dword_xor",
|
||||
'6':"countdown",
|
||||
'7':"fnstenv_mov",
|
||||
'8':"jmp_call_additive",
|
||||
'9':"nonalpha",
|
||||
'10':"nonupper",
|
||||
'11':"unicode_mixed",
|
||||
'12':"unicode_upper",
|
||||
'13':"alpha2",
|
||||
'14':"",
|
||||
'15':"MULTIENCODE",
|
||||
'16':"BACKDOOR",
|
||||
'1':"shikata_ga_nai",
|
||||
'2':"",
|
||||
'3':"MULTIENCODE",
|
||||
'4':"BACKDOOR",
|
||||
}.get(encode,"ERROR")
|
||||
|
||||
|
||||
|
|
|
@ -402,22 +402,10 @@ powershell_text = ("""
|
|||
The """ + bcolors.BOLD + """Powershell Attack Vector""" + bcolors.ENDC + """ module allows you to create PowerShell specific attacks. These attacks will allow you to use PowerShell which is available by default in all operating systems Windows Vista and above. PowerShell provides a fruitful landscape for deploying payloads and performing functions that do not get triggered by preventative technologies.\n""")
|
||||
|
||||
|
||||
encoder_menu = ['avoid_utf8_tolower (Normal)',
|
||||
'shikata_ga_nai (Very Good)',
|
||||
'alpha_mixed (Normal)',
|
||||
'alpha_upper (Normal)',
|
||||
'call4_dword_xor (Normal)',
|
||||
'countdown (Normal)',
|
||||
'fnstenv_mov (Normal)',
|
||||
'jmp_call_additive (Normal)',
|
||||
'nonalpha (Normal)',
|
||||
'nonupper (Normal)',
|
||||
'unicode_mixed (Normal)',
|
||||
'unicode_upper (Normal)',
|
||||
'alpha2 (Normal)',
|
||||
'No Encoding (None)',
|
||||
'Multi-Encoder (Excellent)',
|
||||
'Backdoored Executable (BEST)\n']
|
||||
encoder_menu = ['shikata_ga_nai',
|
||||
'No Encoding',
|
||||
'Multi-Encoder',
|
||||
'Backdoored Executable\n']
|
||||
|
||||
encoder_text = """
|
||||
Select one of the below, 'backdoored executable' is typically the best. However,
|
||||
|
|
Loading…
Reference in a new issue