Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
To fix this, I needed to explicitly cast types in the SizeOf and
PtrToStructure methods.
|
|
To fix this, I needed to explicitly cast types in the SizeOf and
PtrToStructure methods.
|
|
Get-ObjDump parses and return information about one or more Windows
object files. It is similar to dumpbin but it returns objects!
|
|
Webstersprodigy portscan
|
|
|
|
into webstersprodigy-Portscan
Conflicts:
Recon/Recon.psd1
|
|
|
|
Get-NtSystemInformation now returns SystemCodeIntegrityInformation -
i.e. user-mode code integrity settings. This required reverse
engineering a dll that is only present on Windows 8 ARM devices.
|
|
Bug fix for error handling
|
|
Fix error handling and various style problems
|
|
|
|
Add checks to terminate script if not running in proper environment.
|
|
Added checks to ensure that the script is being ran on a domain-joined machine and with a domain account.
|
|
|
|
Get-Keystrokes is a PowerShell keylogger
|
|
|
|
|
|
|
|
See https://github.com/mattifestation/PowerSploit/pull/6#issuecomment-19289063
1) I like this feedback a lot and took it.
2) I tried going thread only but it got messed up with very large scans. Eventually,
I didn't think it was worth the amount of effort to make it reliable with only threads
3) Tried to do this
4) Did this
5) I like the idea in general and I took this one place (top-ports), but not for the two
examples you gave. The reasoning is, I want people to be able to specify various options
and arrays aren't that flexible. For example, I want people to specify a port list like
"80,90,8080-8090". Similar with CIDR, since that's one option, but they could also be
specifying hostnames e.g. "google.com,192.168.1.1/24,10.0.0.1"
|
|
|
|
|
|
|
|
|
|
|
|
I was calling the [Guid]::TryParse method that was only present in .NET
4 so this wasn't working in PowerShell v2.
|
|
|
|
You can provide a CLSID (i.e. a Guid) to New-Object via the -ComObject
parameter in addition to a ProgId.
|
|
When displaying handle information, you can now filter by and display
object type names: Get-NtSystemInformation
|
|
Another awesome addition from Joe Bialek. Invoke-ReflectivePEInjection
is a vast improvement over Invoke-ReflectiveDllInjection. It adds the
following features:
* Now supports loading exe files in memory
* Supports reflective dll injection into a remote process
* Additional sample Visual Studio solutions
|
|
I was checking processor architecture when I should have been checking
OS architecture.
|
|
Thanks @JosephBialek!
|
|
|
|
|
|
|
|
|
|
Yet another method of leaking kernel pointers.
|
|
Out-Minidump writes a process dump file with all process memory to disk.
This is similar to running procdump.exe with the '-ma' switch.
|
|
* Removed the unnecessary NTSTATUS entries
* Used splatting instead of backticks
* Fixed a n00b memory management error as well.
|
|
|
|
Causes a blue-screen (bugcheck) to occur.
|
|
|
|
|
|
|
|
Get-NtSystemInformation is a wrapper function for
NtQuerySystemInformation. It is a swiss-army knife tool for obtaining
internal OS information. It can currently be used to query the
following: global flags, handles, objects, kernel pool allocations, and
loaded kernel modules
|
|
Making way for Get-NtSystemInformation. Loaded kernel module information
can be viewed with `Get-NtSystemInformation -ModuleInformation`
|
|
There was some test code at the end of Invoke-ShellcodeMSIL that would
cause the function to execute when the script was dotsourced.
|
|
ConvertTo-String converts the bytes of a file to a string that has a
1-to-1 mapping back to the file's original bytes. ConvertTo-String is
useful for performing binary regular expressions.
|
|
Merged Find-AVSignature performance improvements from garignack. Thanks, garignack!
|
|
Added comment-based help parameter, added additional parameter
validation, piped ReadStream.seek command to out-null to prevent output
to stdout.
|