diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2015-12-18 16:17:16 -0800 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2015-12-18 16:17:16 -0800 |
commit | 29ae830b7331410c507156ba8c8099f77948c783 (patch) | |
tree | e09eefc2bc2dbc71180663d0a53422cf5c6941de /PowerSploit.psd1 | |
parent | 26e0b29e674c407964ea831714c3a3c8b3ea320d (diff) | |
download | PowerSploit-29ae830b7331410c507156ba8c8099f77948c783.tar.gz PowerSploit-29ae830b7331410c507156ba8c8099f77948c783.zip |
Improved root module manifest for PS Gallery
Diffstat (limited to 'PowerSploit.psd1')
-rw-r--r-- | PowerSploit.psd1 | 130 |
1 files changed, 116 insertions, 14 deletions
diff --git a/PowerSploit.psd1 b/PowerSploit.psd1 index dd096a5..10c59f2 100644 --- a/PowerSploit.psd1 +++ b/PowerSploit.psd1 @@ -11,29 +11,131 @@ GUID = '6753b496-d842-40a3-924a-0f09e248640c' # Author of this module Author = 'Matthew Graeber' -# Company or vendor of this module -CompanyName = '' - # Copyright statement for this module Copyright = 'BSD 3-Clause' # Description of the functionality provided by this module -Description = 'PowerSploit Root Module' +Description = 'PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Functions to export from this module -FunctionsToExport = '*' - -# Cmdlets to export from this module -CmdletsToExport = '*' - -# Variables to export from this module -VariablesToExport = '' - -# Aliases to export from this module -AliasesToExport = '' +FunctionsToExport = @( + 'Add-NetUser', + 'Add-ObjectAcl', + 'Add-Persistence', + 'Convert-NameToSid', + 'Convert-NT4toCanonical', + 'Convert-SidToName', + 'Copy-ClonedFile', + 'Find-AVSignature', + 'Find-ComputerField', + 'Find-DLLHijack', + 'Find-ForeignGroup', + 'Find-ForeignUser', + 'Find-GPOComputerAdmin', + 'Find-GPOLocation', + 'Find-InterestingFile', + 'Find-LocalAdminAccess', + 'Find-PathHijack', + 'Find-UserField', + 'Get-ADObject', + 'Get-ApplicationHost', + 'Get-CachedRDPConnection', + 'Get-ComputerDetails', + 'Get-ComputerProperty', + 'Get-DFSshare', + 'Get-DomainPolicy', + 'Get-ExploitableSystem', + 'Get-GPPPassword', + 'Get-HttpStatus', + 'Get-Keystrokes', + 'Get-LastLoggedOn', + 'Get-NetComputer', + 'Get-NetDomain', + 'Get-NetDomainController', + 'Get-NetDomainTrust', + 'Get-NetFileServer', + 'Get-NetForest', + 'Get-NetForestCatalog', + 'Get-NetForestDomain', + 'Get-NetForestTrust', + 'Get-NetGPO', + 'Get-NetGPOGroup', + 'Get-NetGroup', + 'Get-NetGroupMember', + 'Get-NetLocalGroup', + 'Get-NetLoggedon', + 'Get-NetOU', + 'Get-NetProcess', + 'Get-NetRDPSession', + 'Get-NetSession', + 'Get-NetShare', + 'Get-NetSite', + 'Get-NetSubnet', + 'Get-NetUser', + 'Get-ObjectAcl', + 'Get-PathAcl', + 'Get-Proxy', + 'Get-RegAlwaysInstallElevated', + 'Get-RegAutoLogon', + 'Get-SecurityPackages', + 'Get-ServiceDetail', + 'Get-ServiceFilePermission', + 'Get-ServicePermission', + 'Get-ServiceUnquoted', + 'Get-TimedScreenshot', + 'Get-UnattendedInstallFile', + 'Get-UserEvent', + 'Get-UserProperty', + 'Get-VaultCredential', + 'Get-VolumeShadowCopy', + 'Get-VulnAutoRun', + 'Get-VulnSchTask', + 'Get-Webconfig', + 'Install-ServiceBinary', + 'Install-SSP', + 'Invoke-ACLScanner', + 'Invoke-AllChecks', + 'Invoke-CheckLocalAdminAccess', + 'Invoke-CredentialInjection', + 'Invoke-DllInjection', + 'Invoke-EnumerateLocalAdmin', + 'Invoke-EventHunter', + 'Invoke-FileFinder', + 'Invoke-MapDomainTrust', + 'Invoke-Mimikatz', + 'Invoke-NinjaCopy', + 'Invoke-Portscan', + 'Invoke-ProcessHunter', + 'Invoke-ReflectivePEInjection', + 'Invoke-ReverseDnsLookup', + 'Invoke-ServiceAbuse', + 'Invoke-ShareFinder', + 'Invoke-Shellcode', + 'Invoke-TokenManipulation', + 'Invoke-UserHunter', + 'Invoke-WmiCommand', + 'Mount-VolumeShadowCopy', + 'New-ElevatedPersistenceOption', + 'New-UserPersistenceOption', + 'New-VolumeShadowCopy', + 'Out-CompressedDll', + 'Out-EncodedCommand', + 'Out-EncryptedScript', + 'Out-Minidump', + 'Remove-Comments', + 'Remove-VolumeShadowCopy', + 'Restore-ServiceBinary', + 'Set-ADObject', + 'Set-CriticalProcess', + 'Set-MacAttribute', + 'Set-MasterBootRecord', + 'Write-HijackDll', + 'Write-ServiceBinary', + 'Write-UserAddMSI' +) # List of all modules packaged with this module. ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'}, |