Magic Unicorn
Tool and Usage
Project details
- License
- Custom license
- Programming language
- Python
- Author
- David Kennedy
- Latest release
- 3.17
- Latest release date
Project health
Links
GitHub project |
Why this tool?
Magic Unicorn is a tool to perform a PowerShell downgrade attack and inject shellcode into memory.
How it works
The tool is used together with Metasploit. If Magic Unicorn is located within the right path, then execute the tool. Upon execution, a PowerShell command is generated that can be pasted in a command line window. Another option is to use a payload delivery system from within Metasploit.
Background information
Magic Unicorn is based on Matthew Graeber’s powershell attacks and the powershell bypass technique presented by our own David Kennedy and Josh Kelly at DEF CON 18.
Usage and audience
Magic Unicorn is commonly used for penetration testing or shellcode injection. Target users for this tool are pentesters and security professionals.
Features
- Command line interface
Example usage and output
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + More than 1000 GitHub stars
- + Many releases available
- + The source code of this software is available
History and highlights
- Demo at DEF CON 26 Demo Labs
Installation
Supported operating systems
Magic Unicorn is known to work on Linux.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a PowerShell exploitation tool.