@@ -215665,50 +215665,6 @@
215665215665 "stage_refname": "windows/custom",
215666215666 "stager_refname": "windows/reverse_https"
215667215667 },
215668- "payload_cmd/windows/powershell/custom/reverse_https_proxy": {
215669- "name": "Powershell Exec, Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy",
215670- "fullname": "payload/cmd/windows/powershell/custom/reverse_https_proxy",
215671- "aliases": [
215672-
215673- ],
215674- "rank": 300,
215675- "disclosure_date": null,
215676- "type": "payload",
215677- "author": [
215678- "Spencer McIntyre",
215679- "bwatters-r7",
215680- "hdm <x@hdm.io>",
215681- "corelanc0d3r <peter.ve@corelan.be>",
215682- "amaloteaux <alex_maloteaux@metasploit.com>"
215683- ],
215684- "description": "Execute an x86 payload from a command via PowerShell.\n\nCustom shellcode stage.\n\nTunnel communication over HTTP using SSL with custom proxy support",
215685- "references": [
215686-
215687- ],
215688- "platform": "Windows",
215689- "arch": "cmd",
215690- "rport": null,
215691- "autofilter_ports": null,
215692- "autofilter_services": null,
215693- "targets": null,
215694- "mod_time": "2022-05-27 16:41:25 +0000",
215695- "path": "/modules/payloads/adapters/cmd/windows/powershell.rb",
215696- "is_install_path": true,
215697- "ref_name": "cmd/windows/powershell/custom/reverse_https_proxy",
215698- "check": false,
215699- "post_auth": false,
215700- "default_credential": false,
215701- "notes": {
215702- },
215703- "session_types": false,
215704- "needs_cleanup": false,
215705- "payload_type": 8,
215706- "adapter_refname": "cmd/windows/powershell",
215707- "adapted_refname": "windows/custom/reverse_https_proxy",
215708- "staged": true,
215709- "stage_refname": "windows/custom",
215710- "stager_refname": "windows/reverse_https_proxy"
215711- },
215712215668 "payload_cmd/windows/powershell/custom/reverse_ipv6_tcp": {
215713215669 "name": "Powershell Exec, Windows shellcode stage, Reverse TCP Stager (IPv6)",
215714215670 "fullname": "payload/cmd/windows/powershell/custom/reverse_ipv6_tcp",
@@ -218250,53 +218206,6 @@
218250218206 "stage_refname": "windows/meterpreter",
218251218207 "stager_refname": "windows/reverse_https"
218252218208 },
218253- "payload_cmd/windows/powershell/meterpreter/reverse_https_proxy": {
218254- "name": "Powershell Exec, Reverse HTTPS Stager with Support for Custom Proxy",
218255- "fullname": "payload/cmd/windows/powershell/meterpreter/reverse_https_proxy",
218256- "aliases": [
218257-
218258- ],
218259- "rank": 300,
218260- "disclosure_date": null,
218261- "type": "payload",
218262- "author": [
218263- "Spencer McIntyre",
218264- "skape <mmiller@hick.org>",
218265- "sf <stephen_fewer@harmonysecurity.com>",
218266- "OJ Reeves",
218267- "hdm <x@hdm.io>",
218268- "corelanc0d3r <peter.ve@corelan.be>",
218269- "amaloteaux <alex_maloteaux@metasploit.com>"
218270- ],
218271- "description": "Execute an x86 payload from a command via PowerShell.\n\nTunnel communication over HTTP using SSL with custom proxy support",
218272- "references": [
218273- "URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
218274- "URL-https://github.com/rapid7/ReflectiveDLLInjection"
218275- ],
218276- "platform": "Windows",
218277- "arch": "cmd",
218278- "rport": null,
218279- "autofilter_ports": null,
218280- "autofilter_services": null,
218281- "targets": null,
218282- "mod_time": "2022-05-27 16:41:25 +0000",
218283- "path": "/modules/payloads/adapters/cmd/windows/powershell.rb",
218284- "is_install_path": true,
218285- "ref_name": "cmd/windows/powershell/meterpreter/reverse_https_proxy",
218286- "check": false,
218287- "post_auth": false,
218288- "default_credential": false,
218289- "notes": {
218290- },
218291- "session_types": false,
218292- "needs_cleanup": false,
218293- "payload_type": 8,
218294- "adapter_refname": "cmd/windows/powershell",
218295- "adapted_refname": "windows/meterpreter/reverse_https_proxy",
218296- "staged": true,
218297- "stage_refname": "windows/meterpreter",
218298- "stager_refname": "windows/reverse_https_proxy"
218299- },
218300218209 "payload_cmd/windows/powershell/meterpreter/reverse_ipv6_tcp": {
218301218210 "name": "Powershell Exec, Reverse TCP Stager (IPv6)",
218302218211 "fullname": "payload/cmd/windows/powershell/meterpreter/reverse_ipv6_tcp",
@@ -244858,47 +244767,6 @@
244858244767 "stage_refname": "windows/custom",
244859244768 "stager_refname": "windows/reverse_https"
244860244769 },
244861- "payload_windows/custom/reverse_https_proxy": {
244862- "name": "Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy",
244863- "fullname": "payload/windows/custom/reverse_https_proxy",
244864- "aliases": [
244865-
244866- ],
244867- "rank": 300,
244868- "disclosure_date": null,
244869- "type": "payload",
244870- "author": [
244871- "bwatters-r7",
244872- "hdm <x@hdm.io>",
244873- "corelanc0d3r <peter.ve@corelan.be>",
244874- "amaloteaux <alex_maloteaux@metasploit.com>"
244875- ],
244876- "description": "Custom shellcode stage.\n\nTunnel communication over HTTP using SSL with custom proxy support",
244877- "references": [
244878-
244879- ],
244880- "platform": "Windows",
244881- "arch": "x86",
244882- "rport": null,
244883- "autofilter_ports": null,
244884- "autofilter_services": null,
244885- "targets": null,
244886- "mod_time": "2024-12-06 09:15:36 +0000",
244887- "path": "/modules/payloads/stagers/windows/reverse_https_proxy.rb",
244888- "is_install_path": true,
244889- "ref_name": "windows/custom/reverse_https_proxy",
244890- "check": false,
244891- "post_auth": false,
244892- "default_credential": false,
244893- "notes": {
244894- },
244895- "session_types": false,
244896- "needs_cleanup": false,
244897- "payload_type": 2,
244898- "staged": true,
244899- "stage_refname": "windows/custom",
244900- "stager_refname": "windows/reverse_https_proxy"
244901- },
244902244770 "payload_windows/custom/reverse_ipv6_tcp": {
244903244771 "name": "Windows shellcode stage, Reverse TCP Stager (IPv6)",
244904244772 "fullname": "payload/windows/custom/reverse_ipv6_tcp",
@@ -247194,50 +247062,6 @@
247194247062 "stage_refname": "windows/meterpreter",
247195247063 "stager_refname": "windows/reverse_https"
247196247064 },
247197- "payload_windows/meterpreter/reverse_https_proxy": {
247198- "name": "Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager with Support for Custom Proxy",
247199- "fullname": "payload/windows/meterpreter/reverse_https_proxy",
247200- "aliases": [
247201-
247202- ],
247203- "rank": 300,
247204- "disclosure_date": null,
247205- "type": "payload",
247206- "author": [
247207- "skape <mmiller@hick.org>",
247208- "sf <stephen_fewer@harmonysecurity.com>",
247209- "OJ Reeves",
247210- "hdm <x@hdm.io>",
247211- "corelanc0d3r <peter.ve@corelan.be>",
247212- "amaloteaux <alex_maloteaux@metasploit.com>"
247213- ],
247214- "description": "Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer.\n\nTunnel communication over HTTP using SSL with custom proxy support",
247215- "references": [
247216- "URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
247217- "URL-https://github.com/rapid7/ReflectiveDLLInjection"
247218- ],
247219- "platform": "Windows",
247220- "arch": "x86",
247221- "rport": null,
247222- "autofilter_ports": null,
247223- "autofilter_services": null,
247224- "targets": null,
247225- "mod_time": "2024-12-06 09:15:36 +0000",
247226- "path": "/modules/payloads/stagers/windows/reverse_https_proxy.rb",
247227- "is_install_path": true,
247228- "ref_name": "windows/meterpreter/reverse_https_proxy",
247229- "check": false,
247230- "post_auth": false,
247231- "default_credential": false,
247232- "notes": {
247233- },
247234- "session_types": false,
247235- "needs_cleanup": false,
247236- "payload_type": 2,
247237- "staged": true,
247238- "stage_refname": "windows/meterpreter",
247239- "stager_refname": "windows/reverse_https_proxy"
247240- },
247241247065 "payload_windows/meterpreter/reverse_ipv6_tcp": {
247242247066 "name": "Windows Meterpreter (Reflective Injection), Reverse TCP Stager (IPv6)",
247243247067 "fullname": "payload/windows/meterpreter/reverse_ipv6_tcp",
0 commit comments