This is the Windows app named Invoke-PSImage whose latest release can be downloaded as Invoke-PSImagesourcecode.tar.gz. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named Invoke-PSImage with OnWorks for free.
Segui queste istruzioni per eseguire questa app:
- 1. Scaricata questa applicazione sul tuo PC.
- 2. Entra nel nostro file manager https://www.onworks.net/myfiles.php?username=XXXXX con il nome utente che desideri.
- 3. Carica questa applicazione in tale file manager.
- 4. Avvia qualsiasi emulatore online OS OnWorks da questo sito Web, ma migliore emulatore online Windows.
- 5. Dal sistema operativo OnWorks Windows che hai appena avviato, vai al nostro file manager https://www.onworks.net/myfiles.php?username=XXXXX con il nome utente che desideri.
- 6. Scarica l'applicazione e installala.
- 7. Scarica Wine dai repository software delle tue distribuzioni Linux. Una volta installato, puoi quindi fare doppio clic sull'app per eseguirli con Wine. Puoi anche provare PlayOnLinux, un'interfaccia fantasiosa su Wine che ti aiuterà a installare programmi e giochi Windows popolari.
Wine è un modo per eseguire il software Windows su Linux, ma senza Windows richiesto. Wine è un livello di compatibilità Windows open source in grado di eseguire programmi Windows direttamente su qualsiasi desktop Linux. Essenzialmente, Wine sta cercando di re-implementare abbastanza Windows da zero in modo che possa eseguire tutte quelle applicazioni Windows senza effettivamente bisogno di Windows.
IMMAGINI
Ad
Invoke-PSImage
DESCRIZIONE
Invoke-PSImage is a PowerShell utility that hides, extracts, and optionally executes PowerShell payloads inside image files using simple steganography techniques. It can embed a script or binary blob into an image (commonly PNG or JPEG) and later recover that payload without leaving a separate file on disk, enabling in-memory execution workflows. The tool offers options for compression and encryption so the embedded content is both smaller and protected by a passphrase when required. It includes helpers to encode a payload into an image, decode an embedded payload back to readable form, and run the extracted content directly from memory to avoid touching disk. Designed as a compact, single-file PowerShell script, it relies on .NET imaging APIs to manipulate pixel data or metadata and to store the payload in a way that survives ordinary file transfers. Because the project enables hiding and executing code, it’s a dual-use toolkit: useful for red-team exercises, defensive steganography d
Caratteristiche
- Embed PowerShell scripts or binary payloads into PNG/JPEG images using LSB or metadata techniques
- Optional compression of the payload before embedding to reduce image size overhead
- AES/passphrase encryption of the embedded payload to protect contents in transit
- Extraction routine that recovers the payload and can output to disk or to standard output
- In-memory execution mode that decodes and runs the payload without writing an unencrypted file to disk
- Simple CLI switches and single-file PowerShell implementation for quick use in red/blue team labs
Linguaggio di programmazione
PowerShell
Categorie
This is an application that can also be fetched from https://sourceforge.net/projects/invoke-psimage.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.