This is the Windows app named Invoke-PSImage whose latest release can be downloaded as Invoke-PSImagesourcecode.tar.gz. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named Invoke-PSImage with OnWorks for free.
Follow these instructions in order to run this app:
- 1. Downloaded this application in your PC.
- 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 3. Upload this application in such filemanager.
- 4. Start any OS OnWorks online emulator from this website, but better Windows online emulator.
- 5. From the OnWorks Windows OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 6. Download the application and install it.
- 7. Download Wine from your Linux distributions software repositories. Once installed, you can then double-click the app to run them with Wine. You can also try PlayOnLinux, a fancy interface over Wine that will help you install popular Windows programs and games.
Wine is a way to run Windows software on Linux, but with no Windows required. Wine is an open-source Windows compatibility layer that can run Windows programs directly on any Linux desktop. Essentially, Wine is trying to re-implement enough of Windows from scratch so that it can run all those Windows applications without actually needing Windows.
SCREENSHOTS:
Invoke-PSImage
DESCRIPTION:
Invoke-PSImage is a PowerShell utility that hides, extracts, and optionally executes PowerShell payloads inside image files using simple steganography techniques. It can embed a script or binary blob into an image (commonly PNG or JPEG) and later recover that payload without leaving a separate file on disk, enabling in-memory execution workflows. The tool offers options for compression and encryption so the embedded content is both smaller and protected by a passphrase when required. It includes helpers to encode a payload into an image, decode an embedded payload back to readable form, and run the extracted content directly from memory to avoid touching disk. Designed as a compact, single-file PowerShell script, it relies on .NET imaging APIs to manipulate pixel data or metadata and to store the payload in a way that survives ordinary file transfers. Because the project enables hiding and executing code, it’s a dual-use toolkit: useful for red-team exercises, defensive steganography d
Features
- Embed PowerShell scripts or binary payloads into PNG/JPEG images using LSB or metadata techniques
- Optional compression of the payload before embedding to reduce image size overhead
- AES/passphrase encryption of the embedded payload to protect contents in transit
- Extraction routine that recovers the payload and can output to disk or to standard output
- In-memory execution mode that decodes and runs the payload without writing an unencrypted file to disk
- Simple CLI switches and single-file PowerShell implementation for quick use in red/blue team labs
Programming Language
PowerShell
Categories
This is an application that can also be fetched from https://sourceforge.net/projects/invoke-psimage.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.