Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Flebbi's Achievements

  1. That actually worked for me. Thank you for your help, Posh and kuyaya.
  2. Yes, I know this all, and I am a local admin. I tested it on my Win10 machine. I get what the function should do and how it could be used. I just don't get what I'm doing wrong. What exactly have you done, that it worked on your machine? Here's what I did (you could also see it in the video but I'll explain it here to clarify 100%): First, I copy-pasted this text into powershell (not elevated powershell, just normal powershell) and hit enter. Second I ran this command {Invoke-TaskCleanerBypass -Method Encoded -EncodedCommand "bgBvAHQAZQBwAGEAZAA="} (without the {} of course) which is also on your readme on github so that should definitly work. I also tried replacing the encoded "notepad" text by encooded cmd or powershell, same result. Nothing pops up. I just did these two steps: Copy-paste the function and run the command. Do I have to do anything else or why does it not work🤔🤔
  3. @PoSHMagiC0deBut haven't I done this already? I took the exact command from your github: Invoke-TaskCleanerBypass -Method Encoded -EncodedCommand "bgBvAHQAZQBwAGEAZAA=". This is the encoded method and the command "notepad" is encoded into base64. That should start notepad as administrator, shouldn't it? And if I try the file method I also get nothing. I tried that: Invoke-TaskCleanerBypass -Method File -Filename C:\users\\$env:username\Documents\myscript.ps1 while myscript.ps1 was containing only that command: "Start-Process notepad". I tried also to write "U3RhcnQtUHJvY2VzcyBub3RlcGFk" (start-process notepad in base64) into the file instead of "start-process notepad" but that gave me the same "nothing-happens" result.
  4. This was created by @PoSHMagiC0de Can somebody tell me what I'm doing wrong?
  5. Yes, I've already tried that. Still doesn't work.
  6. Did it. That thing came out
  7. Hey The payload doesn't work for me. When I run DumpHash.py by hand it gives me that output: Any ideas on how to fix it?
  8. I mean, besides the other abilities of the packet squirrel, can you also use it as a vpn?
  9. On the Hak5 Shop is the following sentence: " This Ethernet multi-tool is designed to give you covert remote access, painless packet captures, and secure VPN connections with the flip of a switch. " So can you use the packet squirrel as a free vpn?
  10. Got that fixed by microsoft and now you can't get the hashes from locked machines anymore?
  11. I downloaded responder and copied the payload into the switch position. Everything seems to go fine, but the yellow blinking led never finishes. I plugged it in a locked computer for 20 minutes and it was still attacking. It created the folder with my hostname but I didn't receive the hashes. It found nothingd
  12. Hi Is it possible to make a reverse shell even if you are not in the same wlan as your victim? Thanks in advance
  • Create New...