aboutsummaryrefslogtreecommitdiff
path: root/README
AgeCommit message (Collapse)AuthorFilesLines
2013-01-15Added Get-TimedScreenshotbitform1-0/+4
A function that takes screenshots at a regular interval and saves them to a folder. Developed by @obscuresec
2013-01-07Added Get-PEBbitform1-0/+4
Returns the process environment block (PEB) of a process.
2013-01-02Added Get-StructFromMemorybitform1-0/+4
Marshals data from an unmanaged block of memory in an arbitrary process to a newly allocated managed object of the specified type. In other words, it will parse and return a structure at a known memory address in any process.
2012-12-16Added Get-KernelModuleInfobitform1-0/+4
Returns loaded kernel module information.
2012-12-12Added Find-AVSignaturebitform1-0/+4
A tool for bypassing AV signatures.
2012-12-01Added Out-CompressedDllbitform1-0/+4
A script to aid in the loading of managed dlls in memory
2012-11-22Adding Prepare-Payloadbitform1-0/+4
Prepare-Payload compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script. This script was inspired by and an improvement upon createcmd.ps1 (https://www.trustedsec.com/files/PowerShell_PoC.zip)
2012-11-17Adding Get-MethodAddressbitform1-0/+4
2012-10-27Added Get-Stringsbitform1-1/+5
Get-Strings dumps strings from any file in Ascii and/or Unicode.
2012-08-20Updated Inject-Shellcode and style guidebitform1-6/+4
New Features/Changes: - Dramatically simplified parameters. Removed redundancies and named parameter sets more appropriately - Added 'Shellcode' parameter. Now, you can optionally specify shellcode as a byte array rather than having to copy and paste shellcode into the $Shellcode32 and/or $Shellcode64 variables - Added 'Payload' parameter. Naming is now consistant with Metasploit payloads. Currently, only 'windows/meterpreter/reverse_http' and 'windows/meterpreter/reverse_https' payloads are supported. - Inject-Shellcode will now prompt the user to continue the 'dangerous' action unless the -Force switch is provided. Hopefully, this will prevent some people from carrying out stupid/regrettable actions. - Added the 'ListMetasploitPayloads' switch to display the Metasploit payloads supported by Inject-Shellcode Bug fixes/Miscellaneous: - Added UserAgent parameter to help documentation - Code is much more readable now - Changed internal helper functions to 'local' scope - Now using proper error handling versus Write-Warning statements - Added a subtle warning to the built-in shellcode...
2012-08-11Added the Get-Member proxy functionbitform1-0/+4
This extends the built-in Get-Member cmdlet by adding the '-Private' parameter for dissecting .NET types.
2012-08-09Added additional recon dictionariesbitform1-1/+5
2012-08-07Added Get-HttpStatus and 'Recon' directorybitform1-7/+21
* All recon scripts not live in the 'Recon' directory * Added Get-HttpStatus - An http[s] enumeration tool * Added default dictionary for Get-HttpStatus - .\Dictionaries\admin.txt * Moved Invoke-ReverseDnsLookup to 'Recon'
2012-07-22Added Get-PEHeader. PETools is now a module.bitform1-2/+18
Get-PEHeader is a 32 and 64-bit in-memory and on-disk PE parsing utility. PETools is now a PowerShell module that can be loaded with `Import-Module PETools`
2012-06-26Added Get-ILDisassembly - an MSIL disassemblerbitform1-0/+6
Added Get-ILDisassembly. Added RE_Tools folder for all current and future reverse engineering tools.
2012-06-26Changed licensing to BSD 3-Clausebitform1-6/+14
Fixed some spelling errors in README. Added additional usage information
2012-06-02Added two PE tools and updated Readmebitform1-1/+12
Added: Get-DllLoadPath, Get-PEArchitecture Updated: Readme to reflect new additions
2012-05-26Added Invoke-ReverseDnsLookupbitform1-0/+4
2012-05-26Added style guide to the readmebitform1-1/+51
2012-05-26Added Get-GPPPasswordbitform1-0/+5
Used with permission from @obscuresec (www.obscuresecurity.blogspot.com)
2012-05-26Complete rewrite of Powersyringebitform1-0/+19