https://github.com/mtgsoftworks/apce
PowerShell Code Execution Builder Fully UnDetectable (FUD) Exploit
https://github.com/mtgsoftworks/apce
exploit fud-crypter powershell python3
Last synced: 12 months ago
JSON representation
PowerShell Code Execution Builder Fully UnDetectable (FUD) Exploit
- Host: GitHub
- URL: https://github.com/mtgsoftworks/apce
- Owner: mtgsoftworks
- License: mit
- Created: 2024-04-20T19:32:51.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-06-14T17:56:37.000Z (over 1 year ago)
- Last Synced: 2025-01-18T02:19:22.318Z (about 1 year ago)
- Topics: exploit, fud-crypter, powershell, python3
- Language: Python
- Homepage:
- Size: 57.6 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# APCE® - Arbitrary Powershell Code Execution
APCE is a tool written in Python and designed to execute PowerShell code on the target system. This tool processes the PowerShell code, encrypts it and adds some evasion techniques, thus bypassing the firewalls of the target system.
## ----- Features -----
Powershell Payload Processing: Processes a PowerShell payload file specified by the user.
Encryption: Encrypts the processed PowerShell file, making it difficult to detect.
Evasion Techniques: Adds evasion techniques to the generated PowerShell file, thus avoiding Antivirus programs.
Cleanup: Cleans up unnecessary files after the process is complete.
## ----- Usage -----
Start the tool using the python main.py command.
Following the prompt, enter the name of the PowerShell payload file you want to execute.
Wait until the process starts.
After the process is complete, observe the results.
## ----- Requirements -----
Python 3.x
pyfiglet
chilkat
Warning
This tool should only be used for lawful purposes. No responsibility is accepted for any malicious use.
## ----- License -----
This project is licensed under the MIT license. See the LICENSE file for more information.
## ----- Contribution -----
If you would like to contribute, please open an issue or submit a request.