aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2013-05-02Find-AVSignature Performance Improvementsgarignack1-132/+177
Updated code to use [System.IO.FileStream] class with a buffer (64kb default) to greatly increase performance, especially when handling large files. Updated $EndBytes validation logic to change it to a valid value rather than throw an error.
2013-04-06Adding reflective DLL loading capabilityMatt Graeber15-1/+1960
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing this awesome code!
2013-04-05Adding Invoke-ShellcodeMSILMatt Graeber3-87/+361
Invoke-ShellcodeMSIL executes shellcode without making any Win32 function calls.
2013-04-05Fixed x86 bug in Get-MethodAddressMatt Graeber1-110/+119
Get-MethodAddress was not working correctly in 32-bit PowerShell because it was returning a [UInt64] value when it should have been a [UInt32]. This fix will detect if PowerShell is running as 32 or 64-bit and define its return type accordingly.
2013-04-04Adding Persistence moduleMatt Graeber8-284/+1049
2013-03-10DownloadFromMSSymbolServer is a better nameMatt Graeber1-1/+1
2013-03-10Fixed export parsing bug in Get-PEHeaderMatt Graeber1-1/+1
2013-03-10Added DownloadEXEFromMSSymbolServer methodMatt Graeber1-881/+902
After parsing a PE header with Get-PEHeader, you now have the option of downloading the original executable from Microsoft's symbol server for reference/comparision.
2013-02-17Updated 64-32bit conversion logic for Metasploitbitform1-2/+2
2013-02-17Get-MethodAddress now returns an IntPtr.bitform1-3/+1
It previously returned a UInt64. Returning an IntPtr makes more sense.
2013-01-23Removed .git* filesbitform2-4/+0
They weren't relevant.
2013-01-21Consistency improvements in comment-based helpbitform21-234/+296
2013-01-20PowerSploit is now a respectable module!bitform3-31/+150
PowerSploit just got a complete makeover! It is now comprised of a collection of modules grouped by category.
2013-01-20Updated PETools module file listbitform1-1/+1
2013-01-20Corrections made to usage documentationbitform2-2/+2
2013-01-20Moved scripts to their respective modules.bitform5-1354/+0
2013-01-20Added 'AntivirusBypass' Modulebitform4-0/+218
2013-01-20Added 'CodeExecution' Modulebitform5-0/+1142
* I unfortunately needed to change the names of Inject-Shellcode and Inject-Dll to Invoke-Shellcode and Invoke-DllInjection in order to confirm to proper verb naming.
2013-01-20Added 'Exfiltration' Modulebitform4-0/+199
2013-01-20Added 'Recon' Modulebitform4-0/+199
2013-01-20Updated module manifest file listingbitform2-2/+2
2013-01-20Renamed Usage.txt to Usage.md to apply markdown.bitform3-0/+0
2013-01-20Updated PowerSploit README with proper markdownbitform2-189/+168
2013-01-20Created a ScriptModification module.bitform8-48/+326
* All scripts used to prepare and/or modify payload scripts were added to the ScriptModification module. * Added Remove-Comments - Strips comments and extra whitespace from a script. * Encrypt-Script was named to Out-EncryptedScript in order to conform to proper PowerShell verbs.
2013-01-20Removed logic in scripts to load ps1xml filesbitform5-27/+13
* Now that PETools and ReverseEngineering are both full-fledged modules with proper manifests, the manifests will take care of loading the appropriate ps1xml files. * Added Usage.txt to ReverseEngineering module.
2013-01-19PETools module doc. consistency improvementsbitform5-80/+182
* Slight consistency modifications were made to documentation. * Added module manifest for PETools
2013-01-19Renamed RE_Tools. Now ReverseEngineering modulebitform12-89/+227
* I renamed RE_Tools to ReverseEngineering and made it a module. * Slight consistency modifications were made to documentation. * This is one step in the process of modularizing all of PowerSploit.
2013-01-19Removed old release notes.bitform1-17/+0
2013-01-19Added 'Id' parameter documentation to Get-PEBbitform1-0/+4
Forgot to add this. Oops.
2013-01-19Removed ValueFromPipeline from the Path param.bitform1-2/+2
That parameter attribute doesn't make sense in this context.
2013-01-19Updated readme to reflect renamed Prepare-Payloadbitform1-1/+1
2013-01-19Improved Prepare-Payload (now Out-EncodedCommand)bitform2-154/+182
* Renamed Prepare-Payload to Out-EncodedCommand in order to conform to a standard cmdlet verb. * Fixed bug in PowerShell v2 * Defaults to full base-64 encoding unless it exceeds the cmd.exe character limit. Otherwise, it will default to partial base-64 encoding in an effort to save space. Thanks @Carlos_Perez for the idea! * User will be prompted if the cmd.exe character limit is exceeded. * Command-line output uses truncated arguments in order to save space. Thanks @obscuresec!
2013-01-15Added Get-TimedScreenshotbitform2-0/+103
A function that takes screenshots at a regular interval and saves them to a folder. Developed by @obscuresec
2013-01-13Prepare-Payload now accepts pipeline outputbitform1-2/+2
2013-01-13Fixed bug in Prepare-Payloadbitform1-2/+12
* Some payloads were not decoding properly after being uncompressed. This was due to a bug in how `Get-Content -Encoding ASCII` was interpreting input. When reading a script from a file, Prepare-payload no longer makes any assumptions about the script's encoding. * Prepare-Payload will display a warning if the cmd.exe or base64 string length maximums are exceeded.
2013-01-07Added Get-PEBbitform3-0/+2114
Returns the process environment block (PEB) of a process.
2013-01-02Added Get-StructFromMemorybitform2-0/+205
Marshals data from an unmanaged block of memory in an arbitrary process to a newly allocated managed object of the specified type. In other words, it will parse and return a structure at a known memory address in any process.
2012-12-30Fixed several bugs in Get-KernelModuleInfobitform1-8/+3
* The script now silently continues if the ps1xml file is not present. * Removed compiler parameter code. This was a remnant of the first version of Get-KernelModuleInfo when it compiled code. * Improved the heuristics for determining when the last kernel module is encountered.
2012-12-16Improved Get-KernelModuleInfobitform1-59/+108
Get-KernelModuleInfo utilizes reflection exclusively now and no longer requires compilation of C# code. This means that is runs entirely in memory.
2012-12-16Added Get-KernelModuleInfobitform3-0/+287
Returns loaded kernel module information.
2012-12-14Added the Wow64 switch to Prepare-Payloadbitform1-3/+17
Now, you can optionally output a call to the x86 (Wow64) version of PowerShell.
2012-12-12Added Find-AVSignaturebitform2-0/+122
A tool for bypassing AV signatures.
2012-12-01Added Out-CompressedDllbitform2-0/+83
A script to aid in the loading of managed dlls in memory
2012-11-22Fixed Prepare-Payload documentation grammar fail.bitform1-1/+1
2012-11-22Adding Prepare-Payloadbitform2-0/+134
Prepare-Payload compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script. This script was inspired by and an improvement upon createcmd.ps1 (https://www.trustedsec.com/files/PowerShell_PoC.zip)
2012-11-17Adding Get-MethodAddressbitform2-0/+114
2012-10-27Added Get-Stringsbitform2-1/+101
Get-Strings dumps strings from any file in Ascii and/or Unicode.
2012-09-21Nearly complete rewrite of Inject-Dllbitform1-93/+224
The functionality remains the same but the code was cleaned up drastically to be more consistent with PowerShell scripting best practices.
2012-09-11Improved Metasploit payload support for 32/64-bitbitform1-1/+37
Updated Inject-Shellcode. If running a 32-bit Metasploit payload from 64-bit PowerShell, it will prompt the user to execute the payload from 32-bit PowerShell. This fix was in response to Chris Gate's feature request: http://carnal0wnage.attackresearch.com/2012/05/powershell-shellcode-metasploit-x64.html Note, there are some side effects: 1) It takes about one minute to initialize and execute the payload in the 32-bit process. This is because the execution essentially emulates copying and pasting its contents into the child process. 2) You will see some output artifacts of the script running in the child PowerShell process. I couldn't think of a good way to rectify these problems without dropping the contents of the script to disk, which would not be desireable.
2012-08-24Cleaned up Encrypt-Script coment-based helpbitform1-35/+56