aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2015-12-18 16:17:16 -0800
committerMatt Graeber <mattgraeber@gmail.com>2015-12-18 16:17:16 -0800
commit29ae830b7331410c507156ba8c8099f77948c783 (patch)
treee09eefc2bc2dbc71180663d0a53422cf5c6941de
parent26e0b29e674c407964ea831714c3a3c8b3ea320d (diff)
downloadPowerSploit-29ae830b7331410c507156ba8c8099f77948c783.tar.gz
PowerSploit-29ae830b7331410c507156ba8c8099f77948c783.zip
Improved root module manifest for PS Gallery
-rw-r--r--PowerSploit.psd1130
1 files changed, 116 insertions, 14 deletions
diff --git a/PowerSploit.psd1 b/PowerSploit.psd1
index dd096a5..10c59f2 100644
--- a/PowerSploit.psd1
+++ b/PowerSploit.psd1
@@ -11,29 +11,131 @@ GUID = '6753b496-d842-40a3-924a-0f09e248640c'
# Author of this module
Author = 'Matthew Graeber'
-# Company or vendor of this module
-CompanyName = ''
-
# Copyright statement for this module
Copyright = 'BSD 3-Clause'
# Description of the functionality provided by this module
-Description = 'PowerSploit Root Module'
+Description = 'PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'
# Functions to export from this module
-FunctionsToExport = '*'
-
-# Cmdlets to export from this module
-CmdletsToExport = '*'
-
-# Variables to export from this module
-VariablesToExport = ''
-
-# Aliases to export from this module
-AliasesToExport = ''
+FunctionsToExport = @(
+ 'Add-NetUser',
+ 'Add-ObjectAcl',
+ 'Add-Persistence',
+ 'Convert-NameToSid',
+ 'Convert-NT4toCanonical',
+ 'Convert-SidToName',
+ 'Copy-ClonedFile',
+ 'Find-AVSignature',
+ 'Find-ComputerField',
+ 'Find-DLLHijack',
+ 'Find-ForeignGroup',
+ 'Find-ForeignUser',
+ 'Find-GPOComputerAdmin',
+ 'Find-GPOLocation',
+ 'Find-InterestingFile',
+ 'Find-LocalAdminAccess',
+ 'Find-PathHijack',
+ 'Find-UserField',
+ 'Get-ADObject',
+ 'Get-ApplicationHost',
+ 'Get-CachedRDPConnection',
+ 'Get-ComputerDetails',
+ 'Get-ComputerProperty',
+ 'Get-DFSshare',
+ 'Get-DomainPolicy',
+ 'Get-ExploitableSystem',
+ 'Get-GPPPassword',
+ 'Get-HttpStatus',
+ 'Get-Keystrokes',
+ 'Get-LastLoggedOn',
+ 'Get-NetComputer',
+ 'Get-NetDomain',
+ 'Get-NetDomainController',
+ 'Get-NetDomainTrust',
+ 'Get-NetFileServer',
+ 'Get-NetForest',
+ 'Get-NetForestCatalog',
+ 'Get-NetForestDomain',
+ 'Get-NetForestTrust',
+ 'Get-NetGPO',
+ 'Get-NetGPOGroup',
+ 'Get-NetGroup',
+ 'Get-NetGroupMember',
+ 'Get-NetLocalGroup',
+ 'Get-NetLoggedon',
+ 'Get-NetOU',
+ 'Get-NetProcess',
+ 'Get-NetRDPSession',
+ 'Get-NetSession',
+ 'Get-NetShare',
+ 'Get-NetSite',
+ 'Get-NetSubnet',
+ 'Get-NetUser',
+ 'Get-ObjectAcl',
+ 'Get-PathAcl',
+ 'Get-Proxy',
+ 'Get-RegAlwaysInstallElevated',
+ 'Get-RegAutoLogon',
+ 'Get-SecurityPackages',
+ 'Get-ServiceDetail',
+ 'Get-ServiceFilePermission',
+ 'Get-ServicePermission',
+ 'Get-ServiceUnquoted',
+ 'Get-TimedScreenshot',
+ 'Get-UnattendedInstallFile',
+ 'Get-UserEvent',
+ 'Get-UserProperty',
+ 'Get-VaultCredential',
+ 'Get-VolumeShadowCopy',
+ 'Get-VulnAutoRun',
+ 'Get-VulnSchTask',
+ 'Get-Webconfig',
+ 'Install-ServiceBinary',
+ 'Install-SSP',
+ 'Invoke-ACLScanner',
+ 'Invoke-AllChecks',
+ 'Invoke-CheckLocalAdminAccess',
+ 'Invoke-CredentialInjection',
+ 'Invoke-DllInjection',
+ 'Invoke-EnumerateLocalAdmin',
+ 'Invoke-EventHunter',
+ 'Invoke-FileFinder',
+ 'Invoke-MapDomainTrust',
+ 'Invoke-Mimikatz',
+ 'Invoke-NinjaCopy',
+ 'Invoke-Portscan',
+ 'Invoke-ProcessHunter',
+ 'Invoke-ReflectivePEInjection',
+ 'Invoke-ReverseDnsLookup',
+ 'Invoke-ServiceAbuse',
+ 'Invoke-ShareFinder',
+ 'Invoke-Shellcode',
+ 'Invoke-TokenManipulation',
+ 'Invoke-UserHunter',
+ 'Invoke-WmiCommand',
+ 'Mount-VolumeShadowCopy',
+ 'New-ElevatedPersistenceOption',
+ 'New-UserPersistenceOption',
+ 'New-VolumeShadowCopy',
+ 'Out-CompressedDll',
+ 'Out-EncodedCommand',
+ 'Out-EncryptedScript',
+ 'Out-Minidump',
+ 'Remove-Comments',
+ 'Remove-VolumeShadowCopy',
+ 'Restore-ServiceBinary',
+ 'Set-ADObject',
+ 'Set-CriticalProcess',
+ 'Set-MacAttribute',
+ 'Set-MasterBootRecord',
+ 'Write-HijackDll',
+ 'Write-ServiceBinary',
+ 'Write-UserAddMSI'
+)
# List of all modules packaged with this module.
ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'},