Skip to content
This repository was archived by the owner on Jan 21, 2021. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
58 commits
Select commit Hold shift + click to select a range
17dd683
Update Invoke-TokenManipulation.ps1
FixTheExchange Oct 30, 2015
e179b2e
Update Invoke-TokenManipulation.ps1
FixTheExchange Oct 30, 2015
5a812ce
Normalizing all files to ascii encoding
Nov 4, 2015
2dd1f59
Revert "Normalizing all files to ascii encoding"
Nov 4, 2015
12ce71b
Normalizing all files to ascii encoding
Nov 4, 2015
d0fff7b
Migrating everything back to Invoke-Shellcode.ps1. I'm done making my…
Nov 4, 2015
5065810
Removing Metasploit integration from Invoke-Shellcode
Nov 5, 2015
81b5773
Adding Visual Studio 2015 project file
Nov 5, 2015
d1145e0
Re-import Invoke-Shellcode.ps1
Nov 5, 2015
641eff7
Test: Ensure all scripts are not LE Unicode encoded
Nov 5, 2015
18b7a10
Removing Invoke-ShellcodeMSIL
Nov 5, 2015
17bfa4e
Fixed a casting bug
Nov 6, 2015
0eb520e
Removed extraneous parameters
Nov 8, 2015
b8e831e
Revert "Removed extraneous parameters"
Nov 8, 2015
992f980
Removed extraneous parameters
Nov 8, 2015
aae81dd
Adding -DoNotZeroMZ for testing
Nov 8, 2015
a0ab599
Excluding the Tests folder from being loaded as a module
Nov 9, 2015
a78b404
Revert "Excluding the Tests folder from being loaded as a module"
Nov 9, 2015
c03965c
Adding Pester tests for CodeExecution module
Nov 9, 2015
62bb142
Excluding the Tests folder from being loaded as a module
Nov 9, 2015
729e9ca
Removing Invoke-ShellcodeMSIL from psproj file
Nov 9, 2015
5fb6905
Integration of PowerView into ./Recon/
HarmJ0y Dec 4, 2015
8ab8c49
Added ./Privesc/ folder that integrates PowerUp.ps1
HarmJ0y Dec 4, 2015
c143dc6
Privesc/PowerUp Pester tests
HarmJ0y Dec 4, 2015
e44df18
Start of Recon/PowerView Pester tests
HarmJ0y Dec 4, 2015
a0b95c3
Domain local group query fix.
HarmJ0y Dec 11, 2015
a336562
Added Invoke-DowngradeAccount to set an account to use reversible enc…
HarmJ0y Dec 11, 2015
93a71b0
Adding PollingInterval param to Get-Keystrokes
ICanHazDonuts Dec 14, 2015
7f6d3a4
Fix Invoke-Shellcode OS architecture detection
ICanHazDonuts Dec 14, 2015
a235313
Modified Tests/Recon.tests.ps1 to ensure file artifacts are not left …
HarmJ0y Dec 14, 2015
e2993b6
Modified Tests/Privesc.tests.ps1 to ensure file artifacts are not lef…
HarmJ0y Dec 14, 2015
5690b09
Get-NetDomain now not called if -ComputerName or -ComputerFile are pa…
HarmJ0y Dec 15, 2015
9ffc26a
Added admin rights check for existing Privesc Pester tests
HarmJ0y Dec 15, 2015
ce3b216
Bugfix #92: perform OS check when importing NtCreateThreadEx
ICanHazDonuts Dec 15, 2015
00af165
Bugfix #93
ICanHazDonuts Dec 15, 2015
0181ff0
Removed C# enum for Test-ServiceDaclPermission
HarmJ0y Dec 15, 2015
dae9d91
Merge branch 'dev' of https://github.com/PowerShellMafia/PowerSploit …
HarmJ0y Dec 15, 2015
55fabd7
Removed commented blocks.
HarmJ0y Dec 15, 2015
e144be7
Invoke-Mimkatz: Incorporated latest 2.0 alpha build
ICanHazDonuts Dec 15, 2015
924103a
Invoke-DllInjection Pester test improvement
ICanHazDonuts Dec 15, 2015
f6e032c
Invoke-WmiCommand now obtains full powershell path
ICanHazDonuts Dec 15, 2015
f70c63f
Invoke-WmiCommand is now PSv2 compatible
ICanHazDonuts Dec 15, 2015
fef09e6
Merge pull request #91 from FixTheExchange/patch-1
Dec 15, 2015
fdcdeab
Fixed Invoke-WmiCommand credential popup issue
ICanHazDonuts Dec 16, 2015
9a2dfad
Fixed mangled decrypted script output
ICanHazDonuts Dec 16, 2015
ef37a13
Fixed Add-Persistence. Issue #98
ICanHazDonuts Dec 16, 2015
f5d9b25
Invoke-DllInjection detects OS arch on all OSes
ICanHazDonuts Dec 16, 2015
1cdad58
Added a slight delay to Invoke-DllInjection validation
ICanHazDonuts Dec 16, 2015
70f25c9
Update README.md
Dec 16, 2015
b01a812
Added volume shadow copy functions to README.md
Dec 17, 2015
c2a7092
Removed all version numbers from scripts
ICanHazDonuts Dec 17, 2015
55098d5
Removed version numbers from scripts
ICanHazDonuts Dec 17, 2015
98ebc1b
Invoke-ReflectivePEInjection test harnesses updated
ICanHazDonuts Dec 18, 2015
52c46b1
Revert "Invoke-ReflectivePEInjection test harnesses updated"
ICanHazDonuts Dec 18, 2015
2a8da71
Updated .psproj to reflect additions/removals
ICanHazDonuts Dec 18, 2015
26e0b29
Added manifest info for the PowerShell Gallery
ICanHazDonuts Dec 18, 2015
29ae830
Improved root module manifest for PS Gallery
ICanHazDonuts Dec 19, 2015
9f183e3
Set all module versions to 3.0
ICanHazDonuts Dec 19, 2015
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
59 changes: 1 addition & 58 deletions AntivirusBypass/AntivirusBypass.psd1
Original file line number Diff line number Diff line change
Expand Up @@ -4,17 +4,14 @@
ModuleToProcess = 'AntivirusBypass.psm1'

# Version number of this module.
ModuleVersion = '1.0.0.0'
ModuleVersion = '3.0.0.0'

# ID used to uniquely identify this module
GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'

# Author of this module
Author = 'Matthew Graeber'

# Company or vendor of this module
CompanyName = ''

# Copyright statement for this module
Copyright = 'BSD 3-Clause'

Expand All @@ -24,64 +21,10 @@ Description = 'PowerSploit Antivirus Avoidance/Bypass Module'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'

# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''

# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''

# Minimum version of the .NET Framework required by this module
# DotNetFrameworkVersion = ''

# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''

# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''

# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()

# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()

# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = ''

# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()

# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()

# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()

# Functions to export from this module
FunctionsToExport = '*'

# Cmdlets to export from this module
CmdletsToExport = '*'

# Variables to export from this module
VariablesToExport = ''

# Aliases to export from this module
AliasesToExport = ''

# List of all modules packaged with this module.
ModuleList = @(@{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'})

# List of all files packaged with this module
FileList = 'AntivirusBypass.psm1', 'AntivirusBypass.psd1', 'Find-AVSignature.ps1', 'Usage.md'

# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''

# HelpInfo URI of this module
# HelpInfoURI = ''

# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''

}
61 changes: 3 additions & 58 deletions CodeExecution/CodeExecution.psd1
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
ModuleToProcess = 'CodeExecution.psm1'

# Version number of this module.
ModuleVersion = '1.0.0.0'
ModuleVersion = '3.0.0.0'

# ID used to uniquely identify this module
GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'
Expand All @@ -24,65 +24,10 @@ Description = 'PowerSploit Code Execution Module'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'

# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''

# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''

# Minimum version of the .NET Framework required by this module
# DotNetFrameworkVersion = ''

# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''

# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''

# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()

# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()

# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = ''

# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()

# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()

# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()

# Functions to export from this module
FunctionsToExport = '*'

# Cmdlets to export from this module
CmdletsToExport = '*'

# Variables to export from this module
VariablesToExport = ''

# Aliases to export from this module
AliasesToExport = ''

# List of all modules packaged with this module.
ModuleList = @(@{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'})

# List of all files packaged with this module
FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke--Shellcode.ps1', 'Invoke-DllInjection.ps1',
'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Invoke-WmiCommand.ps1', 'Usage.md'

# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''

# HelpInfo URI of this module
# HelpInfoURI = ''

# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''

FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', 'Invoke-DllInjection.ps1',
'Invoke-ReflectivePEInjection.ps1', 'Invoke-WmiCommand.ps1', 'Usage.md'
}
2 changes: 1 addition & 1 deletion CodeExecution/CodeExecution.psm1
Original file line number Diff line number Diff line change
@@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | ? {$_.Name -ne 'Invoke-Shellcode.ps1'} | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Loading