{
	"id": "44be2bc1-580d-42ca-9a85-4c11fd920f28",
	"created_at": "2026-04-06T00:14:07.357963Z",
	"updated_at": "2026-04-10T03:20:23.238295Z",
	"deleted_at": null,
	"sha1_hash": "b1801ba2a01382993e5a7b5e86daf598d1d0a07c",
	"title": "GitHub - Cn33liz/StarFighters: A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 43575,
	"plain_text": "GitHub - Cn33liz/StarFighters: A JavaScript and VBScript Based\r\nEmpire Launcher, which runs within their own embedded\r\nPowerShell Host.\r\nBy Cn33liz\r\nArchived: 2026-04-05 14:25:05 UTC\r\n _________ __ ___________.__ .__ __\r\n / _____// |______ ______\\_ _____/|__| ____ | |___/ |_ ___________ ______\r\n \\_____ \\\\ __\\__ \\\\_ __ \\ __) | |/ ___\\| | \\ __\\/ __ \\_ __ \\/ ___/\r\n / \\| | / __ \\| | \\/ \\ | / /_/ \u003e Y \\ | \\ ___/| | \\/\\___ \\\r\n/_______ /|__| (____ /__| \\___ / |__\\___ /|___| /__| \\___ \u003e__| /____ \u003e\r\n \\/ \\/ \\/ /_____/ \\/ \\/ \\/\r\nA JavaScript and VBScript Based Empire Launcher - by Cn33liz 2017\r\nBoth Launchers run within their own embedded PowerShell Host, so we don't need PowerShell.exe. This might be\r\nusefull when a company is blocking PowerShell.exe and/or is using a Application Whitelisting solution, but does\r\nnot block running JS/VBS files.\r\nEmpire PowerShell Host build by Cn33liz and embedded within JavaScript using DotNetToJScript from James\r\nForshaw https://github.com/tyranid/DotNetToJScript\r\nUsage:\r\n* Setup a new Listener within PowerShell Empire.\r\n* Use the Launcher command to Generate a PowerShell launcher for this listener.\r\n* Copy and Replace the Base64 encoded Launcher Payload within the StarFighter JavaScript or VBScript file.\r\n* For the JavaScript version use the following Variable:\r\n var EncodedPayload = \"\u003cPaste Encoded Launcher Payload Here\u003e\"\r\n* For the VBScript version use the following Variable:\r\n \r\n Dim EncodedPayload: EncodedPayload = \"\u003cPaste Encoded Launcher Payload Here\u003e\"\r\n* Then run: wscript.exe StarFighter.js or StarFighter.vbs on Target, or DoubleClick the launchers within Explore\r\nhttps://github.com/Cn33liz/StarFighters\r\nPage 1 of 2\n\nBlueTeam Advice\r\nInstead of Blocking PowerShell.exe, make sure you enable PowerShell Constrained Language to all of\r\nyour users that do not need to use PowerShell for their daily work.\r\nUse Device Guard and make sure you only allow signed Java, VBS and PowerShell Scripts to prevent\r\nMalicious use.\r\nSource: https://github.com/Cn33liz/StarFighters\r\nhttps://github.com/Cn33liz/StarFighters\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://github.com/Cn33liz/StarFighters"
	],
	"report_names": [
		"StarFighters"
	],
	"threat_actors": [],
	"ts_created_at": 1775434447,
	"ts_updated_at": 1775791223,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/b1801ba2a01382993e5a7b5e86daf598d1d0a07c.pdf",
		"text": "https://archive.orkl.eu/b1801ba2a01382993e5a7b5e86daf598d1d0a07c.txt",
		"img": "https://archive.orkl.eu/b1801ba2a01382993e5a7b5e86daf598d1d0a07c.jpg"
	}
}