Commit Graph

318 Commits

Author SHA1 Message Date
Matt Graeber 18b7a10f89 Removing Invoke-ShellcodeMSIL
This was only ever intended to be a PoC. I'll bring this back if
requested but it exhibits duplicate functionality.
2015-11-05 13:26:05 -05:00
Matt Graeber 641eff706e Test: Ensure all scripts are not LE Unicode encoded 2015-11-05 10:36:17 -05:00
Matt Graeber d1145e0540 Re-import Invoke-Shellcode.ps1 2015-11-05 10:34:26 -05:00
Matt Graeber 81b57738ab Adding Visual Studio 2015 project file
Those who wish to load this project into VS 2015 with Adam Driscoll's
PowerShell VS extension may now do so.
2015-11-05 10:33:53 -05:00
Matt Graeber 5065810c07 Removing Metasploit integration from Invoke-Shellcode
This should have only ever been a shellcode runner. Those wishing to
integrate this with Metasploit should generate a shellcode payload with
msfvenom.
2015-11-05 10:31:40 -05:00
Matt Graeber d0fff7b637 Migrating everything back to Invoke-Shellcode.ps1. I'm done making my point now. :P 2015-11-04 14:56:46 -05:00
Matt Graeber 12ce71b9f4 Normalizing all files to ascii encoding 2015-11-04 13:48:27 -05:00
Matt Graeber 2dd1f5920d Revert "Normalizing all files to ascii encoding"
This reverts commit 5a812ce823.
2015-11-04 13:41:36 -05:00
Matt Graeber 5a812ce823 Normalizing all files to ascii encoding 2015-11-04 13:40:02 -05:00
FixTheExchange e179b2e932 Update Invoke-TokenManipulation.ps1
Removed 2 unnecessary lines.
2015-10-30 12:48:05 -05:00
FixTheExchange 17dd6835b9 Update Invoke-TokenManipulation.ps1
Windows 10 breaks the current version of Invoke-TokenManipulation.ps1 because wininit is now a protected processes.  Rather than hardcoding to a specific process to obtain a SYSTEM token, it's better to enumerate all processes running as SYSTEM and find one that works. I have updated the script to version 1.12 and added logic on lines 1689-1696 to make sure it can successfully grab a SYSTEM token necessary to function.
2015-10-30 11:38:57 -05:00
Matt Graeber 9f78286ea7 Merge pull request #77 from clymb3r/master
Fix for multi-processor systems
2015-09-30 22:07:56 -07:00
clymb3r 235af294ae Fix for multi-processor systems
Fix processor architecture detection for multi-processor systems.
2015-09-30 21:32:04 -07:00
Matt Graeber 03ed2adb56 Adding Invoke-WmiCommand 2015-09-23 15:25:39 -07:00
Matt Graeber 5ce61e40f5 Merge pull request #69 from Invoke-IR/master
Added New-VolumeShadowCopy and Remove-VolumeShadowCopy Cmdlets
2015-08-16 13:02:26 -07:00
Jared Atkinson c29f9b4743 Cleaned up Remove-VSC and New-VSC
- Changed Remove-VSC to have a single mandatory parameter (DevicePath)
- Updated New-VSC to check initial state of the VSS Service and return
VSS to its inital state after execution
2015-07-08 22:27:12 -04:00
Jared Atkinson 25934d4719 Added New-VolumeShadowCopy and Remove-VolumeShadowCopy Cmdlets 2015-07-08 16:57:31 -04:00
Chris Campbell 2153a0a0b0 Merge pull request #68 from hydrajump/get-keystrokes-headings-reorder
Fix for headings in wrong order
2015-05-11 10:13:54 -04:00
Jonathan 0045054ab0 Fix for headings in wrong order
The column headings in the log file are out of order, e.g.

```
"TypedKey","Time","WindowTitle"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:28"
"Document1 - Word","[Shift][Shift]","01-05-2015:20:53:29:31"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:38"
```

The "WindowTitle" should be the first column heading like this,

```
"WindowTitle","TypedKey","Time"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:28"
"Document1 - Word","[Shift][Shift]","01-05-2015:20:53:29:31"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:38"
```
2015-05-10 21:32:14 +02:00
Chris Campbell 5b1a7750c0 URI fix, Proxy Support, UA Update
This fixes the URI bug submitted by @enigma0x3. Thank you for the PR as well! A legacy switch is added in case anyone is relying on this script and an older meterpreter handler. 

Proxy support is added to grab the default proxy by way of a switch.

The default user-agent is grabbed from the registry instead of being a static string.

I tested this on a Windows 7 SP1 (both x86 and 64-bit) and Windows 8.1 (64-bit) with an older handler and an updated one.
2015-04-26 18:32:44 -04:00
mattifestation 130d970c2c Out-EncryptedScript uses FIPS-compliant crypto #60
Thanks, @aconite33 for the suggestion.

- TripleDESCryptoServiceProvider is now used as the crypto algorithm
because it won't break the script when FIPS compliance is enabled in the
registry.
- I actually implemented the InitializationVector parameter
- Cleaned up the output script
- Cleaned up comment-based help
2015-02-26 09:24:45 -05:00
Matt Graeber 8b6f759d12 Merge pull request #62 from clymb3r/master
Update to latest Mimikatz, add sanity checks
2015-02-17 15:41:00 -05:00
clymb3r 2e7dc43edb Update to latest Mimikatz, add sanity checks
Updated to the latest Mimikatz build. Added sanity checks to ensure that
32bit PowerShell isn't being run on a 64bit OS which will cause Mimikatz
to fail.
2015-02-16 23:16:31 -08:00
mattifestation 142afad54e Added parameters back to the original Invoke-Shellcode 2015-02-03 21:47:05 -05:00
mattifestation 59b35d1470 Moved Invoke-Shellcode
These things happen
2015-02-03 21:24:46 -05:00
Matt Graeber a574705ce2 Merge pull request #61 from clymb3r/master
Adding PEBytes parameter
2015-01-26 12:30:28 -05:00
clymb3r 93bc214659 Adding PEBytes parameter
Added PEBytes parameter for reflectively loading a PE file passed as a
byte array to the script.
2015-01-26 09:26:43 -08:00
Matt Graeber b0cdb2b754 Merge pull request #59 from clymb3r/master
Bugfix: Resolving ordinals in remote dll injection
2015-01-09 08:20:06 -05:00
clymb3r 90a05de7a6 Bugfix: Resolving ordinals in remote dll injection
Thanks to sixdub for finding and fixing a bug when resolving functions
by ordinal in remote processes.
2015-01-07 21:08:58 -08:00
mattifestation dc1a5e519f Add-Persistence bugfix
When file paths were specified, they were not being properly validated.
2014-11-17 08:24:54 -05:00
mattifestation 956e4c968a Moving all RE functionality to PowerShellArsenal
https://github.com/mattifestation/PowerShellArsenal

PowerSploit will now stay true to its roots of being a purely offensive
PowerShell module.
2014-11-16 10:26:11 -05:00
mattifestation 97034006f6 Loading of an SSP no longer requires a reboot. 2014-10-01 23:17:56 -04:00
Matt Graeber 4daac216c8 Merge pull request #56 from clymb3r/master
Added -PassThru to Invoke-TokenManipulation
2014-10-01 20:49:35 -04:00
mattifestation 0ca33b0347 Added Install-SSP and Get-SecurityPackages 2014-10-01 20:47:14 -04:00
clymb3r ba02a11687 Added -PassThru to Invoke-TokenManipulation
Thanks to Run Mariboe for the contribution to Invoke-TokenManipulation
adding the -PassThru flag for newly created processes. Version increased
to 1.11.
2014-09-28 19:29:44 -07:00
mattifestation 9d412f0d6a Updating the script style guide #2 2014-09-13 12:39:19 -04:00
mattifestation 6df4cf971b Updating the script style guide 2014-09-13 12:37:50 -04:00
mattifestation 258c760c61 Adding MBR infector Set-MasterBootRecord 2014-08-29 21:44:14 -04:00
mattifestation 2e00756b59 Removing New-Object proxy function 2014-08-09 20:26:17 -04:00
Matt Graeber 36e1e29987 Merge pull request #52 from clymb3r/master
Bug fixes to Invoke-ReflectivePEInjection
2014-07-12 07:46:32 -04:00
clymb3r 03b8d5c6b4 Bug fixes to Invoke-ReflectivePEInjection
Fixed a bug where calling GetProcAddress by ordinal instead of procedure
name failed.
Fixed a bug where reflectively loading an EXE will cause the entry
function (main()) to be called twice instead of once as expected.
Added a ForceASLR flag to force ASLR to be used even if the PE file
doesn't officially support ASLR.
Some minor other changes.
2014-07-10 22:40:01 -07:00
mattifestation b43429dd3c Removed required module statement from Capstone 2014-07-10 19:28:47 -04:00
mattifestation 225fbfbc86 Updated Get-VaultCredential name in README 2014-06-30 17:02:03 -04:00
mattifestation 8c2411ccf3 Get-VaultCredential now takes the singular form. 2014-06-30 15:20:48 -04:00
mattifestation dc3cab2c9f Invoke-DllInjection now calls RtlCreateUserThread
Calling CreateRemoteThread on lsass.

Bug fix: Invoke-DllInjection was checking the processor architecture
when it should have been validating the OS architecture. This would
cause Invoke-DllInjection to fail on a 32-bit OS with a 64-bit
processor.
2014-06-21 11:29:46 -04:00
mattifestation 29a5d48c3f Adding Mayhem module and Set-CriticalProcess 2014-06-19 20:28:50 -04:00
mattifestation 80ffa19fa3 Removing Watch-BlueScreen
This vulnerability was patched a while ago making this function largely
irrelevant.
2014-06-19 20:16:26 -04:00
mattifestation 3444a0700e Updated Get-VaultCredentials - Package SID
Package SIDs are now displayed for Win8 apps. Both the package SID and
secret key are requirements for authenticating to Win8 app servers.
2014-05-31 21:22:22 -04:00
mattifestation 890247deec Issue #43 - Adding Get-VaultCredentials
Displays Windows vault credential objects including cleartext web
credentials.
2014-05-30 21:22:31 -04:00
Chris Campbell 4567547d6d Merge pull request #49 from clymb3r/master
Update to latest Mimikatz (crash fix on Win7/8)
2014-05-20 13:52:14 -04:00