aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2017-01-11Merge pull request #210 from leechristensen/patch-3HarmJ0y1-1/+1
Fixed KerberosPreauthNotRequired
2017-01-11Parenthesis for additional LDAP functionsHarmJ0y1-45/+51
2017-01-11Parenthesis escaping for Get-DomainObject DN searchesHarmJ0y1-14/+17
2017-01-11bug fix for Get-DomainObject/Get-DomainObjectACLHarmJ0y1-2/+2
2017-01-11Fixed bug in Convert-ADName that output an array including null values ↵HarmJ0y1-4/+4
instead of a string
2017-01-11Fixed KerberosPreauthNotRequiredLee Christensen1-1/+1
2017-01-10Merge branch 'dev' of github.com:PowerShellMafia/PowerSploit into devHarmJ0y1-1/+1
2017-01-10Couple of fixes for Get-DomainSPNTicketHarmJ0y1-6/+10
2017-01-09Merge pull request #207 from leechristensen/patch-3HarmJ0y1-1/+1
Words :P
2017-01-09Words :PLee Christensen1-1/+1
2017-01-09Bug fixes in Get-GPPPasswordHarmJ0y1-4/+9
2017-01-08Get-DomainSPNTicket/Invoke-Kerberoast now include 'real' user data in the ↵HarmJ0y1-5/+19
hash output. Added a bit more error handling when requesting the SPN kerberos ticket.
2017-01-07Merge pull request #205 from mbrancato/devHarmJ0y1-2/+2
Fix errors gathering the forest SID
2017-01-07Fix for issue #170HarmJ0y1-183/+279
Added -SearchForest to search all reachable domain trust \SYSVOL\'s Each password is now output as a separate object.
2017-01-04Fix errors gathering the forest SIDMike Brancato1-2/+2
Pull the SID directly from the 'krbtgt' user to avoid errors in ConvertTo-SID
2016-12-21Replaced Invoke-WScriptUACBypass with @enigma0x3's Invoke-EventVwrBypass ↵HarmJ0y2-204/+56
function
2016-12-21Added "-InformationClass Type" to Get-TokenInformation to enumerate token ↵HarmJ0y1-85/+263
type and impersonation level Added Get-ProcessTokenType to enumerate type/impersonation level of a specified process
2016-12-20type correctionHarmJ0y1-3/+3
2016-12-20bug fix in Get-TokenInformationHarmJ0y1-4/+4
2016-12-15Type fix.HarmJ0y1-8/+19
Added -TrustedToAuth to Get-DomainUser
2016-12-15Bug fix for the Find-DomainUserLocation bug fix :)HarmJ0y1-2/+3
2016-12-15Logic bug fix in Get-DomainFileServerHarmJ0y1-3/+6
-Domain bug fix in Find-DomainUserLocation stealth
2016-12-14For ./Recon/ :HarmJ0y14-189/+177
-(More) PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs
2016-12-14For ./ScriptModification/ :HarmJ0y12-53/+574
-PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs
2016-12-14removed whitespaceHarmJ0y2-25/+27
2016-12-14For ./Persistence/ :HarmJ0y8-131/+894
-PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs
2016-12-14For ./Mayhem/ :HarmJ0y4-93/+391
-PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs
2016-12-14For ./CodeExecution/ :HarmJ0y9-2720/+3529
-PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs
2016-12-14For ./Antivirus/ :HarmJ0y3-86/+247
-PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs
2016-12-14-Fixes for PSScriptAnalyzer compatibilityHarmJ0y1-18/+114
-More error handling
2016-12-14mods to Get-System for it to pass PSScriptAnalyzerHarmJ0y1-104/+112
2016-12-14Added documentation for PowerUpHarmJ0y37-126/+3067
2016-12-13updated mkdocs.ymlHarmJ0y1-0/+1
2016-12-13Added Set-DomainObjectOwner to modify an object's ownerHarmJ0y4-20/+431
Modified Convert-LDAPProperty to break out sections of ntsecuritydescriptor
2016-12-13Added Set-DomainUserPassword to reset a particular user's password.HarmJ0y8-184/+298
Reformatted documentation.
2016-12-12maybe now?HarmJ0y1-2/+0
2016-12-12someday I'll get this right...HarmJ0y1-1/+3
2016-12-12Another try at getting readthedocs.io workingHarmJ0y3-80/+469
2016-12-12file extensions are important :)HarmJ0y1-78/+78
2016-12-12First commit of mkdocs.yml for readthedocs.ioHarmJ0y1-0/+85
2016-12-12first take at platyPS doc generationHarmJ0y77-0/+15823
2016-12-12Added spacing to prep for platyPS doc generation.HarmJ0y1-249/+249
2016-12-12Typo correction and Recon README.md updateHarmJ0y3-91/+87
2016-12-12bug fix in Get-DomainSearcherHarmJ0y1-1/+5
2016-12-12-Complete ground-up rewrite of PowerViewHarmJ0y2-8523/+13338
-Lots of function cleanup/code rot removal and standardization -Additional options added to Get-DomainSearcher in order to support new param sets -Expanded parameter validation -XML help format standardized -PSScriptAnalyzer fixups- passes PS script analyzer now! -Nearly all functions should tag custom types to output objectsx -Identity supported by all appropriate functions -Transformed all filters to functions -Expanded the formats for Convert-ADName -Get-SPNTicket returns enc part automatically now, and Hashcat output format added -Write-Verbose/Write-Warning/Throw messages now have the function name tagged in the message -Verb-Domain* functions now all include a -FindOne function to return one result -Get-DomainUserEvent now uses -XPathFilter for a massive speedup -ALL Verb-Domain* (LDAP) functions now return full data objects (no more -FullData). Use -Properties for paring down. -Lots of bug fixes -"Required Dependencies" for each function completed -Fixed logic bugs for -ComputerIdentity in Get-DomainGPO, now enumerates domain-linked GPOs as well -Added -UserIdentity to Get-DomainGPO to enumerate GPOs applied to a given user identity New function naming scheme with proper Verb-PrefixNoun syntax to better match the 'real' AD cmdlets: Verbs: Get - retrieve full raw data sets Find - 'find' specific data entries in a data set or execute threaded computer enumeration Add - add a new object to a destination Set - modify a given object Invoke - lazy catch-all Prefixes now give an indication of the data source: Verb-DomainX - LDAP/.NET AD connections (e.g. Get-DomainUser) Verb-WMIX - Uses WMI for connections/enumeration of a specific host (e.g. Get-WMIRegLastLoggedOn) Verb-NetX - API access (e.g. Get-NetSession) Nouns have been renamed to be more descriptive Big gotcha: Get-NetLocalGroup - now returns local *groups* themselves Get-NetLocalGroupMember - returns local group *members* (old Get-NetLocalGroup) -Parameter sets standardized - parameters shared as appropriate across functions -Identity -> replaces -UserName/-GroupName/etc. Accepts samAccountName, GUID, distinguishedName, SID -these can be used in tandem -> Get-DomainUser "S-1-5-21-890171859-3433809279-3366196753-1108","administrator" -Properties -> return only the specified properties (i.e. Get-DomainUser -Properties samAccountName,lastLogon -LDAPFilter replaces -Filter, -SearchBase replaces -ADSPath, -Server replaces -DomainController -ServerTimeLimit, -SearchScope, -Tombstone, -SecurityMasks added for most functions All functions (as appropriate) now support -Credential: -Verb-Domain* (LDAP) functions use alternate creds for a DirectorySearcher through Get-DomainSearcher -COM methods (i.e. Convert-ADName) use appropriate initializations -Verb-WMI methods pass the -Credential through as appropriate -Verb-Net* (API) functions use Invoke-UserImpersonation/Invoke-RevertToSelf implicitly for token impersonation Removed functions: Get-ComputerProperty, Get-UserProperty, Find-ComputerField, Find-UserField Get-NameField (translated to ValueFromPipelineByPropertyName calls) Invoke-DowngradeAccount - not used Add-NetUser - split into New-DomainUser/others Add-NetGroupUser - split into Add-DomainGroupMember/others New-GPOImmediateTask - inconsistent and better done manually Invoke-StealthUserHunter - combined into Find-DomainUserLocation Get-ExploitableSystem Added helper functions: Get-PrincipalContext - helper to return a DirectoryServices.AccountManagement.PrincipalContext Get-ForestSchemaClass - returns the forest schema for a specified object class Added exported functions: Add-RemoteConnection - 'mounts' a remote UNC path using WNetAddConnection2W Remove-RemoteConnection - 'unmounts' a remote UNC path using WNetCancelConnection2 Invoke-UserImpersonation - creates a new "runas /netonly" type logon and impersonates the token in the current thread Invoke-RevertToSelf - reverts any token impersonation Invoke-Kerberoast - automates Kerberoasting Find-DomainObjectPropertyOutlier - finds user/group/computer objects in AD that have 'outlier' properties sets New-DomainUser - creates a new domain user New-DomainGroup - creates a new domain group Add-DomainGroupMember - adds a domain user (or group) to an existing domain group Get-NetLocalGroup - now returns local *groups* themselves Get-NetLocalGroupMember - returns local group *members* (old Get-NetLocalGroup) Renamed functions (aliases created for old functions): Get-IPAddress -> Resolve-IPAddress Convert-NameToSid -> ConvertTo-SID Convert-SidToName -> ConvertFrom-SID Request-SPNTicket -> Get-DomainSPNTicket Get-DNSZone -> Get-DomainDNSZone Get-DNSRecord -> Get-DomainDNSRecord Get-NetDomain -> Get-Domain Get-NetDomainController -> Get-DomainController Get-NetForest -> Get-Forest Get-NetForestDomain -> Get-ForestDomain Get-NetForestCatalog -> Get-ForestGlobalCatalog Get-NetUser -> Get-DomainUser Get-UserEvent -> Get-DomainUserEvent Get-NetComputer -> Get-DomainComputer Get-ADObject -> Get-DomainObject Set-ADObject -> Set-DomainObject Get-ObjectAcl -> Get-DomainObjectAcl Add-ObjectAcl -> Add-DomainObjectAcl Invoke-ACLScanner -> Find-InterestingDomainAcl Get-GUIDMap -> Get-DomainGUIDMap Get-NetOU -> Get-DomainOU Get-NetSite -> Get-DomainSite Get-NetSubnet -> Get-DomainSubnet Get-NetGroup -> Get-DomainGroup Find-ManagedSecurityGroups -> Get-DomainManagedSecurityGroup Get-NetGroupMember -> Get-DomainGroupMember Get-NetFileServer -> Get-DomainFileServer Get-DFSshare -> Get-DomainDFSShare Get-NetGPO -> Get-DomainGPO Get-NetGPOGroup -> Get-DomainGPOLocalGroup Find-GPOLocation -> Get-DomainGPOUserLocalGroupMapping Find-GPOComputerAdmin -> Get-DomainGPOComputerLocalGroupMappin Get-LoggedOnLocal -> Get-RegLoggedOn Test-AdminAccess -> Invoke-CheckLocalAdminAccess Get-SiteName -> Get-NetComputerSiteName Get-Proxy -> Get-WMIRegProxy Get-LastLoggedOn -> Get-WMIRegLastLoggedOn Get-CachedRDPConnection -> Get-WMIRegCachedRDPConnection Get-RegistryMountedDrive -> Get-WMIRegMountedDrive Get-NetProcess -> Get-WMIProcess Invoke-ThreadedFunction -> New-ThreadedFunction Invoke-UserHunter -> Find-DomainUserLocation Invoke-ProcessHunter -> Find-DomainProcess Invoke-EventHunter -> Find-DomainUserEvent Invoke-ShareFinder -> Find-DomainShare Invoke-FileFinder -> Find-InterestingDomainShareFile Invoke-EnumerateLocalAdmin -> Find-DomainLocalGroupMember Get-NetDomainTrust -> Get-DomainTrust Get-NetForestTrust -> Get-ForestTrust Find-ForeignUser -> Get-DomainForeignUser Find-ForeignGroup -> Get-DomainForeignGroupMember Invoke-MapDomainTrust -> Get-DomainTrustMapping
2016-12-12PowerUp update:HarmJ0y3-1165/+2268
-Standardized documentation, including adding output object types and required dependencies to all functions -Added Get-ProcessTokenPrivilege to enumerate the current (or remote) process token privileges, replacing Get-CurrentUserTokenGroupSid -Added Enable-Privilege to enable privileges using RtlAdjustPrivilege -Added @enigma0x3's Invoke-WScriptUACBypass function -Renamed Invoke-AllChecks to Invoke-PrivescAudit, added alias mapping -Added tests for Get-ProcessTokenPrivilege, Enable-Privilege, and Invoke-WScriptUACBypass -Renamed helper functions for consistency -Passes PSScriptAnalyzer!
2016-12-12typo fix for #179HarmJ0y1-1/+1
2016-12-12removed Pester test for non-exported Invoke-ThreadedFunction functionHarmJ0y1-12/+0
2016-12-12fixed little-endian encodingHarmJ0y2-2/+2
2016-12-12removed Set-MacAttribute Pester testsHarmJ0y1-26/+0