module
Powershell Exec, Windows Command Shell, Reverse TCP Stager (IPv6)
| Disclosed |
|---|
| N/A |
Disclosed
N/A
Description
Execute an x86 payload from a command via PowerShell.
Spawn a piped command shell (staged).
Connect back to the attacker over IPv6
Spawn a piped command shell (staged).
Connect back to the attacker over IPv6
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.