Normalized all scripts to ASCII encoding

This commit is contained in:
mattifestation 2013-11-13 21:01:02 -05:00
parent 306a84fe81
commit 237d362acf
58 changed files with 91 additions and 91 deletions

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'AntivirusBypass.psm1'
@ -84,4 +84,4 @@ FileList = 'AntivirusBypass.psm1', 'AntivirusBypass.psd1', 'Find-AVSignature.ps1
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}

View File

@ -183,4 +183,4 @@ http://heapoverflow.com/f0rums/project.php?issueid=34&filter=changes&page=2
#During testing using large binaries, memory usage was excessive so lets fix that
[System.GC]::Collect()
Write-Verbose "Completed!"
}
}

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'CodeExecution.psm1'
@ -85,4 +85,4 @@ FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', '
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}

View File

@ -325,4 +325,4 @@ http://www.exploit-monday.com
}
Write-Verbose "Injected DLL information:$($DllInfo)"
}
}

View File

@ -2840,4 +2840,4 @@ Function Main
}
Main
}
}

View File

@ -1,4 +1,4 @@
function Invoke-ShellcodeMSIL
function Invoke-ShellcodeMSIL
{
<#
.SYNOPSIS
@ -264,4 +264,4 @@
{
Write-Verbose 'Shellcode executed successfully!'
}
}
}

View File

@ -1,4 +1,4 @@
function Watch-BlueScreen
function Watch-BlueScreen
{
<#
.SYNOPSIS
@ -15,7 +15,7 @@
.NOTES
Tavis Ormandy documented this technique on 2/3/2013 and Nikita Tarakanov
tweeted this technique on 5/13/2013.
?tweeted this technique on 5/13/2013.
.LINK
@ -75,4 +75,4 @@
$Gdi32::SetLayout($DC, $LAYOUT_RTL) | Out-Null
$Gdi32::ScaleWindowExtEx($DC, [Int32]::MinValue, -1, 1, 1, [IntPtr]::Zero) | Out-Null
}
}
}

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Exfiltration.psm1'
@ -86,4 +86,4 @@ FileList = 'Exfiltration.psm1', 'Exfiltration.psd1', 'Get-TimedScreenshot.ps1',
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}

View File

@ -1,4 +1,4 @@
function Get-GPPPassword {
function Get-GPPPassword {
<#
.SYNOPSIS

View File

@ -1,4 +1,4 @@
function Get-Keystrokes {
function Get-Keystrokes {
<#
.SYNOPSIS
@ -246,4 +246,4 @@
} | Out-Null
}
}
}

View File

@ -1,4 +1,4 @@
function Get-TimedScreenshot
function Get-TimedScreenshot
{
<#
.SYNOPSIS

View File

@ -2710,4 +2710,4 @@ Function Main
}
Main
}
}

View File

@ -2845,4 +2845,4 @@ Main
[GC]::Collect()
[GC]::Collect()
}
}

View File

@ -1,4 +1,4 @@
function Invoke-TokenManipulation
function Invoke-TokenManipulation
{
<#
.SYNOPSIS

View File

@ -1,4 +1,4 @@
function Out-Minidump
function Out-Minidump
{
<#
.SYNOPSIS
@ -127,4 +127,4 @@
}
END {}
}
}

View File

@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8" ?>
<?xml version="1.0" encoding="utf-8" ?>
<Configuration>
<ViewDefinitions>
<View>
@ -28,4 +28,4 @@
</ListControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -1,4 +1,4 @@
function Get-LibSymbols
function Get-LibSymbols
{
<#
.SYNOPSIS
@ -279,4 +279,4 @@
}
END {}
}
}

View File

@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8" ?>
<?xml version="1.0" encoding="utf-8" ?>
<Configuration>
<ViewDefinitions>
<View>
@ -289,4 +289,4 @@
</TableControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -1,4 +1,4 @@
function Get-ObjDump
function Get-ObjDump
{
<#
.SYNOPSIS
@ -705,4 +705,4 @@
}
END {}
}
}

View File

@ -957,4 +957,4 @@ PROCESS {
}
}
}

View File

@ -371,4 +371,4 @@
</TableControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'PETools.psm1'
@ -86,4 +86,4 @@ FileList = 'PETools.psm1', 'PETools.psd1', 'PETools.format.ps1xml', 'Get-DllLoad
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}

View File

@ -1,4 +1,4 @@
function Add-Persistence
function Add-Persistence
{
<#
.SYNOPSIS
@ -397,4 +397,4 @@ $UserTriggerRemoval
}
#endregion
}
}

View File

@ -1,4 +1,4 @@
function New-ElevatedPersistenceOptions
function New-ElevatedPersistenceOptions
{
<#
.SYNOPSIS
@ -167,4 +167,4 @@
$PersistenceOptions.PSObject.TypeNames[0] = 'PowerSploit.Persistence.ElevatedPersistenceOptions'
Write-Output $PersistenceOptions
}
}

View File

@ -1,4 +1,4 @@
function New-UserPersistenceOptions
function New-UserPersistenceOptions
{
<#
.SYNOPSIS
@ -125,4 +125,4 @@
$PersistenceOptions.PSObject.TypeNames[0] = 'PowerSploit.Persistence.UserPersistenceOptions'
Write-Output $PersistenceOptions
}
}

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Persistence.psm1'
@ -34,4 +34,4 @@ ModuleList = @(@{ModuleName = 'Persistence'; ModuleVersion = '1.0.0.0'; GUID = '
FileList = 'Persistence.psm1', 'Persistence.psd1', 'Add-Persistence.ps1', 'New-ElevatedPersistenceOptions.ps1',
'New-UserPersistenceOptions.ps1', 'Usage.md'
}
}

View File

@ -1,3 +1,3 @@
. (Join-Path $PSScriptRoot New-ElevatedPersistenceOptions.ps1)
. (Join-Path $PSScriptRoot New-ElevatedPersistenceOptions.ps1)
. (Join-Path $PSScriptRoot New-UserPersistenceOptions.ps1)
. (Join-Path $PSScriptRoot Add-Persistence.ps1)
. (Join-Path $PSScriptRoot Add-Persistence.ps1)

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'PowerSploit.psm1'
@ -93,4 +93,4 @@ FileList = 'PowerSploit.psd1', 'PowerSploit.psm1'
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem $PSScriptRoot | ? { $_.PSIsContainer } | % { Import-Module $_.FullName }
Get-ChildItem $PSScriptRoot | ? { $_.PSIsContainer } | % { Import-Module $_.FullName }

View File

@ -137,4 +137,4 @@ http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
Write-Output $ScanObject
}
}
}

View File

@ -1,4 +1,4 @@
function Invoke-Portscan
function Invoke-Portscan
{
<#
.SYNOPSIS

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Recon.psm1'
@ -72,9 +72,9 @@ AliasesToExport = ''
# List of all modules packaged with this module.
ModuleList = @(@{ModuleName = 'Recon'; ModuleVersion = '1.0.0.0'; GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'})
# List of all files packaged with this module
# List of all files packaged with this module
FileList = 'Recon.psm1', 'Recon.psd1', 'Get-HttpStatus.ps1', 'Invoke-ReverseDnsLookup.ps1',
'Invoke-Portscan.ps1', 'Usage.md'
'Invoke-Portscan.ps1', 'Usage.md'
# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''
@ -85,4 +85,4 @@ FileList = 'Recon.psm1', 'Recon.psd1', 'Get-HttpStatus.ps1', 'Invoke-ReverseDnsL
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}

View File

@ -1,4 +1,4 @@
filter ConvertTo-String
filter ConvertTo-String
{
<#
.SYNOPSIS
@ -67,4 +67,4 @@ http://www.exploit-monday.com
$FileStream.Close()
Write-Output $BinaryText
}
}

View File

@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8" ?>
<?xml version="1.0" encoding="utf-8" ?>
<Configuration>
<ViewDefinitions>
<View>
@ -43,4 +43,4 @@
</TableControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -212,4 +212,4 @@ http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-335.pdf
# Adjust the position in the opcode array accordingly
$Position += $OperandLength
}
}
}

View File

@ -1,4 +1,4 @@
function Get-MethodAddress
function Get-MethodAddress
{
<#
.SYNOPSIS
@ -117,4 +117,4 @@ http://www.exploit-monday.com/2012/11/Get-MethodAddress.html
{
Write-Error "$($MethodInfo.Name) cannot return an unmanaged address."
}
}
}

View File

@ -437,4 +437,4 @@
</ListControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -1,4 +1,4 @@
function Get-NtSystemInformation
function Get-NtSystemInformation
{
<#
.SYNOPSIS

View File

@ -1207,4 +1207,4 @@
</ListControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -1,4 +1,4 @@
function Get-PEB
function Get-PEB
{
<#
.SYNOPSIS
@ -1089,4 +1089,4 @@ http://msdn.microsoft.com/en-us/library/windows/desktop/aa813706(v=vs.85).aspx
END{}
}
}

View File

@ -1,4 +1,4 @@
function Get-Strings
function Get-Strings
{
<#
.SYNOPSIS
@ -95,4 +95,4 @@ http://www.exploit-monday.com
}
}
END {}
}
}

View File

@ -1,4 +1,4 @@
function Get-StructFromMemory
function Get-StructFromMemory
{
<#
.SYNOPSIS
@ -200,4 +200,4 @@ http://www.exploit-monday.com
$SafeHandle.Close()
Write-Output $ParsedStruct
}
}

Binary file not shown.

View File

@ -1,4 +1,4 @@
<?xml version="1.0" encoding="utf-8" ?>
<?xml version="1.0" encoding="utf-8" ?>
<Configuration>
<ViewDefinitions>
<View>
@ -33,4 +33,4 @@
</ListControl>
</View>
</ViewDefinitions>
</Configuration>
</Configuration>

View File

@ -1,4 +1,4 @@
function Register-ProcessModuleTrace
function Register-ProcessModuleTrace
{
<#
.SYNOPSIS
@ -100,4 +100,4 @@ function Unregister-ProcessModuleTrace
#>
Unregister-Event -SourceIdentifier 'ModuleLoaded'
}
}

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'ReverseEngineering.psm1'

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}

View File

@ -1,4 +1,4 @@
function Out-CompressedDll
function Out-CompressedDll
{
<#
.SYNOPSIS
@ -78,4 +78,4 @@ $EncodedCompressedFile
"@
Write-Output $Output
}
}

View File

@ -1,4 +1,4 @@
function Out-EncodedCommand
function Out-EncodedCommand
{
<#
.SYNOPSIS
@ -181,4 +181,4 @@ http://www.exploit-monday.com
}
Write-Output $CommandLineOutput
}
}

View File

@ -126,4 +126,4 @@ return $encoding.GetString($h,0,$h.Length);
Write-Verbose "Encrypted PS1 file saved to: $(Resolve-Path $FilePath)"
}
}

View File

@ -1,4 +1,4 @@
function Remove-Comments
function Remove-Comments
{
<#
.SYNOPSIS
@ -153,4 +153,4 @@ http://www.leeholmes.com/blog/2007/11/07/syntax-highlighting-in-powershell/
}
Write-Output ([ScriptBlock]::Create($StringBuilder.ToString()))
}
}

View File

@ -1,4 +1,4 @@
@{
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'ScriptModification.psm1'
@ -85,4 +85,4 @@ FileList = 'ScriptModification.psm1', 'ScriptModification.psd1', 'Out-Compressed
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
}

View File

@ -1 +1 @@
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}
Get-ChildItem (Join-Path $PSScriptRoot *.ps1) | % { . $_.FullName}