aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorclymb3r <bialek.joseph@gmail.com>2014-04-16 21:02:50 -0700
committerclymb3r <bialek.joseph@gmail.com>2014-04-16 21:02:50 -0700
commitb783b459c12112509a733253df9f5935e104200c (patch)
treee58bce1f7d2f2584d1426262cc609f153d774e51 /README.md
parent47b90647c11cb4956c735cfa47628dc7dcb03bb6 (diff)
parent946328cf9e6d6c60eca2bb9d71a38e210c1c3b6c (diff)
downloadPowerSploit-b783b459c12112509a733253df9f5935e104200c.tar.gz
PowerSploit-b783b459c12112509a733253df9f5935e104200c.zip
Merge branch 'master' of https://github.com/mattifestation/PowerSploit
Conflicts: Recon/Get-ComputerDetails.ps1 Recon/Recon.psd1
Diffstat (limited to 'README.md')
-rw-r--r--README.md34
1 files changed, 31 insertions, 3 deletions
diff --git a/README.md b/README.md
index 4fa1064..20c0417 100644
--- a/README.md
+++ b/README.md
@@ -48,11 +48,11 @@ Strips comments and extra whitespace from a script.
**Add persistence capabilities to a PowerShell script**
-#### `New-UserPersistenceOptions`
+#### `New-UserPersistenceOption`
Configure user-level persistence options for the Add-Persistence function.
-#### `New-ElevatedPersistenceOptions`
+#### `New-ElevatedPersistenceOption`
Configure elevated persistence options for the Add-Persistence function.
@@ -80,6 +80,14 @@ Displays symbolic information from Windows lib files.
Returns the path from which Windows will load a Dll for the given executable.
+## Capstone
+
+**A PowerShell binding for the Capstone Engine disassembly framework.**
+
+#### `Get-CSDisassembly`
+
+Disassembles a byte array using the Capstone Engine disassembly framework.
+
## ReverseEngineering
**Tools to aid in reverse engineering.**
@@ -132,6 +140,10 @@ Displays the process modules that have been loaded since the call to Register-Pr
Stops the running process module trace
+#### `Get-Entropy`
+
+Calculates the entropy of a file or byte array.
+
## AntivirusBypass
**AV doesn't stand a chance against PowerShell!**
@@ -144,6 +156,14 @@ Locates single Byte AV signatures utilizing the same method as DSplit from "clas
**All your data belong to me!**
+#### `Invoke-TokenManipulation`
+
+Lists available logon tokens. Creates processes with other users logon tokens, and impersonates logon tokens in the current thread.
+
+#### `Invoke-CredentialInjection`
+
+Create logons with clear-text credentials without triggering a suspicious Event ID 4648 (Explicit Credential Logon).
+
#### `Invoke-NinjaCopy`
Copies a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.
@@ -164,6 +184,14 @@ Retrieves the plaintext password and other information for accounts pushed throu
A function that takes screenshots at a regular interval and saves them to a folder.
+#### `Get-VolumeShadowCopy`
+
+Lists the device paths of all local volume shadow copies.
+
+#### `Mount-VolumeShadowCopy`
+
+Mounts a volume shadow copy.
+
#### `Out-Minidump`
Generates a full-memory minidump of a process.
@@ -212,7 +240,7 @@ To see the commands imported, type `Get-Command -Module PowerSploit`
If you're running PowerShell v3 and you want to remove the annoying 'Do you really want to run scripts downloaded from the Internet' warning, once you've placed PowerSploit into your module path, run the following one-liner:
`$Env:PSModulePath.Split(';') |
% { if ( Test-Path (Join-Path $_ PowerSploit) )
- {Get-ChildItem -Recurse | Unblock-File} }`
+ {Get-ChildItem $_ -Recurse | Unblock-File} }`
For help on each individual command, Get-Help is your friend.