Vulnerability & Exploit Database

Back to search

Powershell Payload Execution

This module generates a dynamic executable on the session host using .NET templates. Code is pulled from C# templates and impregnated with a payload before being sent to a modified PowerShell session with .NET 4 loaded. The compiler builds the executable (standard or Windows service) in memory and produces a binary which can be started/installed and downloaded for later use. After compilation the PoweShell session can also sign the executable if provided a path the a .pfx formatted certificate.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name



  • RageLtMan <rageltman [at] sempervictus>
  • Matt "hostess" Andreko


  • Universal


  • windows



Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/local/ps_persist msf exploit(ps_persist) > show targets ...targets... msf exploit(ps_persist) > set TARGET <target-id> msf exploit(ps_persist) > show options and set options... msf exploit(ps_persist) > exploit