aboutsummaryrefslogtreecommitdiff
path: root/PowerSploit.psd1
diff options
context:
space:
mode:
Diffstat (limited to 'PowerSploit.psd1')
-rw-r--r--PowerSploit.psd1159
1 files changed, 140 insertions, 19 deletions
diff --git a/PowerSploit.psd1 b/PowerSploit.psd1
index 678294b..bc482e1 100644
--- a/PowerSploit.psd1
+++ b/PowerSploit.psd1
@@ -3,7 +3,7 @@
ModuleToProcess = 'PowerSploit.psm1'
# Version number of this module.
-ModuleVersion = '1.0.0.0'
+ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '6753b496-d842-40a3-924a-0f09e248640c'
@@ -11,35 +11,156 @@ GUID = '6753b496-d842-40a3-924a-0f09e248640c'
# Author of this module
Author = 'Matthew Graeber'
-# Company or vendor of this module
-CompanyName = ''
-
# Copyright statement for this module
Copyright = 'BSD 3-Clause'
# Description of the functionality provided by this module
-Description = 'PowerSploit Root Module'
+Description = 'PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'
# Functions to export from this module
-FunctionsToExport = '*'
+FunctionsToExport = @(
+ 'Add-NetUser',
+ 'Add-ObjectAcl',
+ 'Add-Persistence',
+ 'Convert-NameToSid',
+ 'Convert-NT4toCanonical',
+ 'Convert-SidToName',
+ 'Copy-ClonedFile',
+ 'Find-AVSignature',
+ 'Find-ComputerField',
+ 'Find-DLLHijack',
+ 'Find-ForeignGroup',
+ 'Find-ForeignUser',
+ 'Find-GPOComputerAdmin',
+ 'Find-GPOLocation',
+ 'Find-InterestingFile',
+ 'Find-LocalAdminAccess',
+ 'Find-PathHijack',
+ 'Find-UserField',
+ 'Get-ADObject',
+ 'Get-ApplicationHost',
+ 'Get-CachedRDPConnection',
+ 'Get-ComputerDetails',
+ 'Get-ComputerProperty',
+ 'Get-DFSshare',
+ 'Get-DomainPolicy',
+ 'Get-ExploitableSystem',
+ 'Get-GPPPassword',
+ 'Get-HttpStatus',
+ 'Get-Keystrokes',
+ 'Get-LastLoggedOn',
+ 'Get-NetComputer',
+ 'Get-NetDomain',
+ 'Get-NetDomainController',
+ 'Get-NetDomainTrust',
+ 'Get-NetFileServer',
+ 'Get-NetForest',
+ 'Get-NetForestCatalog',
+ 'Get-NetForestDomain',
+ 'Get-NetForestTrust',
+ 'Get-NetGPO',
+ 'Get-NetGPOGroup',
+ 'Get-NetGroup',
+ 'Get-NetGroupMember',
+ 'Get-NetLocalGroup',
+ 'Get-NetLoggedon',
+ 'Get-NetOU',
+ 'Get-NetProcess',
+ 'Get-NetRDPSession',
+ 'Get-NetSession',
+ 'Get-NetShare',
+ 'Get-NetSite',
+ 'Get-NetSubnet',
+ 'Get-NetUser',
+ 'Get-ObjectAcl',
+ 'Get-PathAcl',
+ 'Get-Proxy',
+ 'Get-RegAlwaysInstallElevated',
+ 'Get-RegAutoLogon',
+ 'Get-SecurityPackages',
+ 'Get-ServiceDetail',
+ 'Get-ServiceFilePermission',
+ 'Get-ServicePermission',
+ 'Get-ServiceUnquoted',
+ 'Get-TimedScreenshot',
+ 'Get-UnattendedInstallFile',
+ 'Get-UserEvent',
+ 'Get-UserProperty',
+ 'Get-VaultCredential',
+ 'Get-VolumeShadowCopy',
+ 'Get-VulnAutoRun',
+ 'Get-VulnSchTask',
+ 'Get-Webconfig',
+ 'Install-ServiceBinary',
+ 'Install-SSP',
+ 'Invoke-ACLScanner',
+ 'Invoke-AllChecks',
+ 'Invoke-CheckLocalAdminAccess',
+ 'Invoke-CredentialInjection',
+ 'Invoke-DllInjection',
+ 'Invoke-EnumerateLocalAdmin',
+ 'Invoke-EventHunter',
+ 'Invoke-FileFinder',
+ 'Invoke-MapDomainTrust',
+ 'Invoke-Mimikatz',
+ 'Invoke-NinjaCopy',
+ 'Invoke-Portscan',
+ 'Invoke-ProcessHunter',
+ 'Invoke-ReflectivePEInjection',
+ 'Invoke-ReverseDnsLookup',
+ 'Invoke-ServiceAbuse',
+ 'Invoke-ShareFinder',
+ 'Invoke-Shellcode',
+ 'Invoke-TokenManipulation',
+ 'Invoke-UserHunter',
+ 'Invoke-WmiCommand',
+ 'Mount-VolumeShadowCopy',
+ 'New-ElevatedPersistenceOption',
+ 'New-UserPersistenceOption',
+ 'New-VolumeShadowCopy',
+ 'Out-CompressedDll',
+ 'Out-EncodedCommand',
+ 'Out-EncryptedScript',
+ 'Out-Minidump',
+ 'Remove-Comments',
+ 'Remove-VolumeShadowCopy',
+ 'Restore-ServiceBinary',
+ 'Set-ADObject',
+ 'Set-CriticalProcess',
+ 'Set-MacAttribute',
+ 'Set-MasterBootRecord',
+ 'Write-HijackDll',
+ 'Write-ServiceBinary',
+ 'Write-UserAddMSI'
+)
-# Cmdlets to export from this module
-CmdletsToExport = '*'
+# List of all modules packaged with this module.
+ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '3.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'},
+ @{ModuleName = 'CodeExecution'; ModuleVersion = '3.0.0.0'; GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'},
+ @{ModuleName = 'Exfiltration'; ModuleVersion = '3.0.0.0'; GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a'},
+ @{ModuleName = 'Recon'; ModuleVersion = '3.0.0.0'; GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'},
+ @{ModuleName = 'ScriptModification'; ModuleVersion = '3.0.0.0'; GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'},
+ @{ModuleName = 'Persistence'; ModuleVersion = '3.0.0.0'; GUID = '633d0f10-a056-41da-869d-6d2f75430195'},
+ @{ModuleName = 'PrivEsc'; ModuleVersion = '3.0.0.0'; GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'} )
-# Variables to export from this module
-VariablesToExport = ''
+PrivateData = @{
-# Aliases to export from this module
-AliasesToExport = ''
+ PSData = @{
+
+ # Tags applied to this module. These help with module discovery in online galleries.
+ Tags = @('security','pentesting','red team','offense')
+
+ # A URL to the license for this module.
+ LicenseUri = 'http://www.apache.org/licenses/LICENSE-2.0.html'
+
+ # A URL to the main website for this project.
+ ProjectUri = 'https://github.com/PowerShellMafia/PowerSploit'
+
+ }
+
+}
-# List of all modules packaged with this module.
-ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'},
- @{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'},
- @{ModuleName = 'Exfiltration'; ModuleVersion = '1.0.0.0'; GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a'},
- @{ModuleName = 'Recon'; ModuleVersion = '1.0.0.0'; GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'},
- @{ModuleName = 'ScriptModification'; ModuleVersion = '1.0.0.0'; GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'},
- @{ModuleName = 'Persistence'; ModuleVersion = '1.0.0.0'; GUID = '633d0f10-a056-41da-869d-6d2f75430195'} )
}