aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2013-05-12Object access mask now displays properlyMatt Graeber1-2/+3
2013-05-12Removed duplicate type definitionMatt Graeber1-15/+0
2013-05-12Removed some extraneous commentsMatt Graeber1-17/+17
2013-05-12Added Get-NtSystemInformationMatt Graeber4-6/+3431
Get-NtSystemInformation is a wrapper function for NtQuerySystemInformation. It is a swiss-army knife tool for obtaining internal OS information. It can currently be used to query the following: global flags, handles, objects, kernel pool allocations, and loaded kernel modules
2013-05-12Removing Get-KernelModuleInfoMatt Graeber2-321/+0
Making way for Get-NtSystemInformation. Loaded kernel module information can be viewed with `Get-NtSystemInformation -ModuleInformation`
2013-05-12Removed test code in Invoke-ShellcodeMSILMatt Graeber1-4/+1
There was some test code at the end of Invoke-ShellcodeMSIL that would cause the function to execute when the script was dotsourced.
2013-05-10Added ConvertTo-StringMatt Graeber1-0/+70
ConvertTo-String converts the bytes of a file to a string that has a 1-to-1 mapping back to the file's original bytes. ConvertTo-String is useful for performing binary regular expressions.
2013-05-06Merge pull request #3 from garignack/masterMatt Graeber1-132/+185
Merged Find-AVSignature performance improvements from garignack. Thanks, garignack!
2013-05-02Code cleanup based upon discussion commentsgarignack1-5/+13
Added comment-based help parameter, added additional parameter validation, piped ReadStream.seek command to out-null to prevent output to stdout.
2013-05-02Find-AVSignature Performance Improvementsgarignack1-132/+177
Updated code to use [System.IO.FileStream] class with a buffer (64kb default) to greatly increase performance, especially when handling large files. Updated $EndBytes validation logic to change it to a valid value rather than throw an error.
2013-04-28Added ARM support to Get-PEHeaderMatt Graeber2-720/+741
Also fixed various pointer width bugs
2013-04-06Adding reflective DLL loading capabilityMatt Graeber15-1/+1960
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing this awesome code!
2013-04-05Adding Invoke-ShellcodeMSILMatt Graeber3-87/+361
Invoke-ShellcodeMSIL executes shellcode without making any Win32 function calls.
2013-04-05Fixed x86 bug in Get-MethodAddressMatt Graeber1-110/+119
Get-MethodAddress was not working correctly in 32-bit PowerShell because it was returning a [UInt64] value when it should have been a [UInt32]. This fix will detect if PowerShell is running as 32 or 64-bit and define its return type accordingly.
2013-04-04Adding Persistence moduleMatt Graeber8-284/+1049
2013-03-10DownloadFromMSSymbolServer is a better nameMatt Graeber1-1/+1
2013-03-10Fixed export parsing bug in Get-PEHeaderMatt Graeber1-1/+1
2013-03-10Added DownloadEXEFromMSSymbolServer methodMatt Graeber1-881/+902
After parsing a PE header with Get-PEHeader, you now have the option of downloading the original executable from Microsoft's symbol server for reference/comparision.
2013-02-17Updated 64-32bit conversion logic for Metasploitbitform1-2/+2
2013-02-17Get-MethodAddress now returns an IntPtr.bitform1-3/+1
It previously returned a UInt64. Returning an IntPtr makes more sense.
2013-01-23Removed .git* filesbitform2-4/+0
They weren't relevant.
2013-01-21Consistency improvements in comment-based helpbitform21-234/+296
2013-01-20PowerSploit is now a respectable module!bitform3-31/+150
PowerSploit just got a complete makeover! It is now comprised of a collection of modules grouped by category.
2013-01-20Updated PETools module file listbitform1-1/+1
2013-01-20Corrections made to usage documentationbitform2-2/+2
2013-01-20Moved scripts to their respective modules.bitform5-1354/+0
2013-01-20Added 'AntivirusBypass' Modulebitform4-0/+218
2013-01-20Added 'CodeExecution' Modulebitform5-0/+1142
* I unfortunately needed to change the names of Inject-Shellcode and Inject-Dll to Invoke-Shellcode and Invoke-DllInjection in order to confirm to proper verb naming.
2013-01-20Added 'Exfiltration' Modulebitform4-0/+199
2013-01-20Added 'Recon' Modulebitform4-0/+199
2013-01-20Updated module manifest file listingbitform2-2/+2
2013-01-20Renamed Usage.txt to Usage.md to apply markdown.bitform3-0/+0
2013-01-20Updated PowerSploit README with proper markdownbitform2-189/+168
2013-01-20Created a ScriptModification module.bitform8-48/+326
* All scripts used to prepare and/or modify payload scripts were added to the ScriptModification module. * Added Remove-Comments - Strips comments and extra whitespace from a script. * Encrypt-Script was named to Out-EncryptedScript in order to conform to proper PowerShell verbs.
2013-01-20Removed logic in scripts to load ps1xml filesbitform5-27/+13
* Now that PETools and ReverseEngineering are both full-fledged modules with proper manifests, the manifests will take care of loading the appropriate ps1xml files. * Added Usage.txt to ReverseEngineering module.
2013-01-19PETools module doc. consistency improvementsbitform5-80/+182
* Slight consistency modifications were made to documentation. * Added module manifest for PETools
2013-01-19Renamed RE_Tools. Now ReverseEngineering modulebitform12-89/+227
* I renamed RE_Tools to ReverseEngineering and made it a module. * Slight consistency modifications were made to documentation. * This is one step in the process of modularizing all of PowerSploit.
2013-01-19Removed old release notes.bitform1-17/+0
2013-01-19Added 'Id' parameter documentation to Get-PEBbitform1-0/+4
Forgot to add this. Oops.
2013-01-19Removed ValueFromPipeline from the Path param.bitform1-2/+2
That parameter attribute doesn't make sense in this context.
2013-01-19Updated readme to reflect renamed Prepare-Payloadbitform1-1/+1
2013-01-19Improved Prepare-Payload (now Out-EncodedCommand)bitform2-154/+182
* Renamed Prepare-Payload to Out-EncodedCommand in order to conform to a standard cmdlet verb. * Fixed bug in PowerShell v2 * Defaults to full base-64 encoding unless it exceeds the cmd.exe character limit. Otherwise, it will default to partial base-64 encoding in an effort to save space. Thanks @Carlos_Perez for the idea! * User will be prompted if the cmd.exe character limit is exceeded. * Command-line output uses truncated arguments in order to save space. Thanks @obscuresec!
2013-01-15Added Get-TimedScreenshotbitform2-0/+103
A function that takes screenshots at a regular interval and saves them to a folder. Developed by @obscuresec
2013-01-13Prepare-Payload now accepts pipeline outputbitform1-2/+2
2013-01-13Fixed bug in Prepare-Payloadbitform1-2/+12
* Some payloads were not decoding properly after being uncompressed. This was due to a bug in how `Get-Content -Encoding ASCII` was interpreting input. When reading a script from a file, Prepare-payload no longer makes any assumptions about the script's encoding. * Prepare-Payload will display a warning if the cmd.exe or base64 string length maximums are exceeded.
2013-01-07Added Get-PEBbitform3-0/+2114
Returns the process environment block (PEB) of a process.
2013-01-02Added Get-StructFromMemorybitform2-0/+205
Marshals data from an unmanaged block of memory in an arbitrary process to a newly allocated managed object of the specified type. In other words, it will parse and return a structure at a known memory address in any process.
2012-12-30Fixed several bugs in Get-KernelModuleInfobitform1-8/+3
* The script now silently continues if the ps1xml file is not present. * Removed compiler parameter code. This was a remnant of the first version of Get-KernelModuleInfo when it compiled code. * Improved the heuristics for determining when the last kernel module is encountered.
2012-12-16Improved Get-KernelModuleInfobitform1-59/+108
Get-KernelModuleInfo utilizes reflection exclusively now and no longer requires compilation of C# code. This means that is runs entirely in memory.
2012-12-16Added Get-KernelModuleInfobitform3-0/+287
Returns loaded kernel module information.