aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
Diffstat (limited to 'README.md')
-rw-r--r--README.md41
1 files changed, 32 insertions, 9 deletions
diff --git a/README.md b/README.md
index 4761e00..b818576 100644
--- a/README.md
+++ b/README.md
@@ -1,7 +1,5 @@
### PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and scripts:
-### Note: All reverse engineering components of PowerSploit now reside in the [PowerShellArsenal](https://github.com/mattifestation/PowerShellArsenal).
-
## CodeExecution
**Execute code on a target machine.**
@@ -18,10 +16,6 @@ Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or
Injects shellcode into the process ID of your choosing or within PowerShell locally.
-#### `Invoke-ShellcodeMSIL`
-
-Execute shellcode within the context of the running PowerShell process without making any Win32 function calls.
-
#### `Invoke-WmiCommand`
Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel.
@@ -96,7 +90,7 @@ Copies a file from an NTFS partitioned volume by reading the raw volume and pars
#### `Invoke-Mimikatz`
-Reflectively loads Mimikatz 1.0 in memory using PowerShell. Can be used to dump credentials without writing anything to disk. Can be used for any functionality provided with Mimikatz.
+Reflectively loads Mimikatz 2.0 in memory using PowerShell. Can be used to dump credentials without writing anything to disk. Can be used for any functionality provided with Mimikatz.
#### `Get-Keystrokes`
@@ -110,6 +104,10 @@ Retrieves the plaintext password and other information for accounts pushed throu
A function that takes screenshots at a regular interval and saves them to a folder.
+#### `New-VolumeShadowCopy`
+
+Creates a new volume shadow copy.
+
#### `Get-VolumeShadowCopy`
Lists the device paths of all local volume shadow copies.
@@ -118,6 +116,10 @@ Lists the device paths of all local volume shadow copies.
Mounts a volume shadow copy.
+#### `Remove-VolumeShadowCopy`
+
+Deletes a volume shadow copy.
+
#### `Get-VaultCredential`
Displays Windows vault credential objects including cleartext web credentials.
@@ -139,6 +141,14 @@ Proof of concept code that overwrites the master boot record with the
Causes your machine to blue screen upon exiting PowerShell.
+## Privesc
+
+**Tools to help with escalating privileges on a target.**
+
+#### `PowerUp`
+
+Clearing house of common privilege escalation checks, along with some weaponization vectors.
+
## Recon
**Tools to aid in the reconnaissance phase of a penetration test.**
@@ -153,7 +163,11 @@ Returns the HTTP Status Codes and full URL for specified paths when provided wit
#### `Invoke-ReverseDnsLookup`
-Scans an IP address range for DNS PTR records. This script is useful for performing DNS reconnaissance prior to conducting an authorized penetration test.
+Scans an IP address range for DNS PTR records.
+
+#### `PowerView`
+
+PowerView is series of functions that performs network and Windows domain enumeration and exploitation.
## Recon\Dictionaries
@@ -189,6 +203,15 @@ For help on each individual command, Get-Help is your friend.
Note: The tools contained within this module were all designed such that they can be run individually. Including them in a module simply lends itself to increased portability.
+## Contribution Rules
+
+We need contributions! If you have a great idea for PowerSploit, we'd love to add it. New additions will require the following:
+
+* The script must adhere to the style guide. Any exceptions to the guide line would need an explicit, valid reason.
+* The module manifest needs to be updated to reflect the new function being added.
+* A brief description of the function should be added to this README.md
+* Pester tests must accompany all new functions. See the Tests folder for examples but we are looking for tests that at least cover the basics by testing for expected/unexpected input/output and that the function exhibits desired functionality. Make sure the function is passing all tests (preferably in mutiple OSes) prior to submitting a pull request. Thanks!
+
## Script Style Guide
**For all contributors and future contributors to PowerSploit, I ask that you follow this style guide when writing your scripts/modules.**
@@ -230,4 +253,4 @@ Note: The tools contained within this module were all designed such that they ca
* Use default values for your parameters when it makes sense. Ideally, you want a script that will work without requiring any parameters.
-* If a script creates complex custom objects, include a ps1xml file that will properly format the object's output. \ No newline at end of file
+* If a script creates complex custom objects, include a ps1xml file that will properly format the object's output.