aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authormattifestation <mattgraeber@gmail.com>2013-10-01 17:41:54 -0400
committerclymb3r <bialek.joseph@gmail.com>2013-11-03 22:48:48 -0800
commitcf64b10d5c2af3d9e64df3bfaad4ff3ded621cf5 (patch)
treeb7b534397fcf5b2e82d96788b8b130c8eef109c5 /README.md
parent70e5b8375bceee892577a66d9f95597e85566110 (diff)
downloadPowerSploit-cf64b10d5c2af3d9e64df3bfaad4ff3ded621cf5.tar.gz
PowerSploit-cf64b10d5c2af3d9e64df3bfaad4ff3ded621cf5.zip
Added exfil script synopses to README.md
Descriptions for Invoke-NinjaCopy and Invoke-Mimikatz were added to the readme.
Diffstat (limited to 'README.md')
-rw-r--r--README.md8
1 files changed, 8 insertions, 0 deletions
diff --git a/README.md b/README.md
index e326519..2d500d7 100644
--- a/README.md
+++ b/README.md
@@ -144,6 +144,14 @@ Locates single Byte AV signatures utilizing the same method as DSplit from "clas
**All your data belong to me!**
+#### `Invoke-NinjaCopy`
+
+Copies a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.
+
+#### `Invoke-Mimikatz`
+
+Reflectively loads Mimikatz 1.0 in memory using PowerShell. Can be used to dump credentials without writing anything to disk. Can be used for any functionality provided with Mimikatz.
+
#### `Get-Keystrokes`
Logs keys pressed, time and the active window.