aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
Diffstat (limited to 'README.md')
-rw-r--r--README.md16
1 files changed, 12 insertions, 4 deletions
diff --git a/README.md b/README.md
index 4761e00..bb46a98 100644
--- a/README.md
+++ b/README.md
@@ -18,10 +18,6 @@ Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or
Injects shellcode into the process ID of your choosing or within PowerShell locally.
-#### `Invoke-ShellcodeMSIL`
-
-Execute shellcode within the context of the running PowerShell process without making any Win32 function calls.
-
#### `Invoke-WmiCommand`
Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel.
@@ -139,6 +135,14 @@ Proof of concept code that overwrites the master boot record with the
Causes your machine to blue screen upon exiting PowerShell.
+## Privesc
+
+**Tools to help with escalating privileges on a target.**
+
+#### `PowerUp`
+
+Clearing house of common privilege escalation checks, along with some weaponization vectors.
+
## Recon
**Tools to aid in the reconnaissance phase of a penetration test.**
@@ -155,6 +159,10 @@ Returns the HTTP Status Codes and full URL for specified paths when provided wit
Scans an IP address range for DNS PTR records. This script is useful for performing DNS reconnaissance prior to conducting an authorized penetration test.
+#### `PowerView`
+
+PowerView is series of functions that performs network and Windows domain enumeration and exploitation.
+
## Recon\Dictionaries
**A collection of dictionaries used to aid in the reconnaissance phase of a penetration test. Dictionaries were taken from the following sources.**