Hack Tools

Invoke-PSImage – Tool to Embed Powershell Scripts in PNG Image Pixels

Invoke-PSImage takes a PowerShell script and embeds the bytes of the script into the pixels of a PNG image. It generates a oneliner for executing either from a file or from the web.

The least significant 4 bits of 2 color values in each pixel are used to hold the payload. Image quality will suffer as a result, but it still looks decent. The image is saved as a PNG, and can be losslessly compressed without affecting the ability to execute the payload as the data is stored in the colors themselves. It can accept most image types as input, but output will always be a PNG because it needs to be lossless.

Each pixel of the image is used to hold one byte of script, so you will need an image with at least as many pixels as bytes in your script. This is fairly easy—for example, Invoke-Mimikatz fits into a 1920×1200 image.

Arguments

-Script [filepath] The path to the script to embed in the Image.

-Image [filepath] The image to embed the script in.

-Out [filepath] The file to save the resulting image to (image will be a PNG)

-Web Output a command for reading the image from the web instead of reading from a file. You will need to host the image and insert the URL into the command.

Example

Create an image with the script “Invoke-Mimikatz.ps1” embeded in it and output a oneliner to execute from disk:

PS>Import-Module .Invoke-PSImage.ps1
PS>Invoke-PSImage -Script .Invoke-Mimikatz.ps1 -Image .kiwi.jpg -Out .evil-kiwi.png
   [Oneliner to execute from a file]

Create an image with the script “Invoke-Mimikatz.ps1” embeded in it and output a oneliner to execute from the web (you still have to host the image and edit the URL):

PS>Import-Module .Invoke-PSImage.ps1
PS>Invoke-PSImage -Script .Invoke-Mimikatz.ps1 -Image .kiwi.jpg -Out .evil-kiwi.png -Web
   [Oneliner to execute from the web]

Executing an image hosted on the web:

 

Download Invoke-PSIMAGE

 

To Top

Pin It on Pinterest

Share This