Commit Graph

308 Commits

Author SHA1 Message Date
Matt Graeber c2a70924e1 Removed all version numbers from scripts
Scripts in a module should not be individually versioned. Only the
module should be versioned.
2015-12-16 17:08:57 -08:00
PowerShellMafia b01a8127bc Added volume shadow copy functions to README.md 2015-12-16 16:52:53 -08:00
PowerShellMafia 70f25c90e2 Update README.md 2015-12-16 15:24:18 -08:00
Matt Graeber 1cdad586c8 Added a slight delay to Invoke-DllInjection validation
In some cases, the loaded module would show up as loaded after the check
occurred.
2015-12-16 14:48:09 -08:00
Matt Graeber f5d9b25275 Invoke-DllInjection detects OS arch on all OSes
This fix addresses issue #99. While I'm not the biggest fan of
performing tests based on environment variables, I felt that making
additional Win32 API calls would have been overkill.
2015-12-16 14:31:03 -08:00
Matt Graeber ef37a138b8 Fixed Add-Persistence. Issue #98 2015-12-16 13:36:22 -08:00
Matt Graeber 9a2dfad3de Fixed mangled decrypted script output
Addresses issue #80. This was a tricky fix because the script should
ideally handle Unicode and Ascii encoded scripts. I haven't tested
scripts with international characters but I would imagine those script
would get mangled since the decrypted output is ultimately normalized to
ascii.
2015-12-16 10:15:14 -08:00
Matt Graeber fdcdeab702 Fixed Invoke-WmiCommand credential popup issue
Easy fix to issue #97
2015-12-16 08:50:34 -08:00
PowerShellMafia fef09e6cc1 Merge pull request #91 from FixTheExchange/patch-1
Update Invoke-TokenManipulation.ps1 to address Win 10 incompatibility
2015-12-15 12:23:12 -08:00
Matt Graeber f70c63f9d5 Invoke-WmiCommand is now PSv2 compatible
This bug fix addresses issue #96. As much as a hate dropping files to
disk, this was the easiest way to preserve objects in PSv2+. If someone
want to implement the [de]serialization themselves and keep everything
in memory, please submit a PR.
2015-12-15 11:55:47 -08:00
Matt Graeber f6e032c3b1 Invoke-WmiCommand now obtains full powershell path
Addresses issue #95.
2015-12-15 09:10:35 -08:00
Matt Graeber 924103aa01 Invoke-DllInjection Pester test improvement
The test dll I now use is advpack.dll since that is present in all
versions of windows.
2015-12-14 20:43:51 -08:00
Matt Graeber e144be7f29 Invoke-Mimkatz: Incorporated latest 2.0 alpha build
Updated embedded powerkatz.dll to the latest version of mimikatz -
[Commit
1b13057](1b130574ed)

This update addresses issue #94.
2015-12-14 20:21:43 -08:00
Harmj0y 55fabd7e2e Removed commented blocks. 2015-12-14 22:00:21 -05:00
Harmj0y dae9d91fdb Merge branch 'dev' of https://github.com/PowerShellMafia/PowerSploit into dev 2015-12-14 21:54:11 -05:00
Harmj0y 0181ff0c09 Removed C# enum for Test-ServiceDaclPermission 2015-12-14 21:53:42 -05:00
Matt Graeber 00af1656b2 Bugfix #93
Removed the "EndAddress" parameter set since it was never used. This
should resolve any parameter set confusion.
2015-12-14 17:26:33 -08:00
Matt Graeber ce3b21685a Bugfix #92: perform OS check when importing NtCreateThreadEx 2015-12-14 16:40:09 -08:00
Harmj0y 9ffc26af70 Added admin rights check for existing Privesc Pester tests 2015-12-14 19:33:15 -05:00
Harmj0y 5690b09027 Get-NetDomain now not called if -ComputerName or -ComputerFile are passed for meta functions, in order to prevent failure when running on a non-domain joined machine
took out FQDN Pester tests from Recon.tests.ps1 that used $env:userdnsdomain
2015-12-14 19:01:10 -05:00
Harmj0y e2993b63aa Modified Tests/Privesc.tests.ps1 to ensure file artifacts are not left on disk. 2015-12-14 18:19:17 -05:00
Harmj0y a235313996 Modified Tests/Recon.tests.ps1 to ensure file artifacts are not left on disk. 2015-12-14 17:34:12 -05:00
Matt Graeber 7f6d3a4565 Fix Invoke-Shellcode OS architecture detection
Fixes issue #70
2015-12-14 11:02:14 -08:00
Matt Graeber 93a71b037c Adding PollingInterval param to Get-Keystrokes
Incorporates idea from @obscuresec in issue #50.
2015-12-14 09:11:05 -08:00
Harmj0y a336562b70 Added Invoke-DowngradeAccount to set an account to use reversible encryption. 2015-12-11 14:58:07 -05:00
Harmj0y a0b95c36b4 Domain local group query fix.
Added ConvertFrom-UACValue to convert binary UAC values to human readable format.
Corrected logic in Set-ADObject.
2015-12-11 10:21:39 -05:00
Harmj0y e44df184a8 Start of Recon/PowerView Pester tests 2015-12-03 21:57:41 -05:00
Harmj0y c143dc6885 Privesc/PowerUp Pester tests 2015-12-03 21:57:26 -05:00
Harmj0y 8ab8c49a0d Added ./Privesc/ folder that integrates PowerUp.ps1
Updated README.md's
2015-12-03 21:56:08 -05:00
Harmj0y 5fb690518d Integration of PowerView into ./Recon/ 2015-12-03 21:50:45 -05:00
Matt Graeber 729e9ca267 Removing Invoke-ShellcodeMSIL from psproj file 2015-11-09 10:58:52 -08:00
Matt Graeber 62bb142a68 Excluding the Tests folder from being loaded as a module 2015-11-09 10:57:19 -08:00
Matt Graeber c03965c8f9 Adding Pester tests for CodeExecution module 2015-11-09 10:56:34 -08:00
Matt Graeber a78b40429e Revert "Excluding the Tests folder from being loaded as a module"
This reverts commit a0ab599810.
2015-11-09 10:52:41 -08:00
Matt Graeber a0ab599810 Excluding the Tests folder from being loaded as a module 2015-11-09 10:52:23 -08:00
Matt Graeber aae81ddfe5 Adding -DoNotZeroMZ for testing 2015-11-07 20:26:08 -08:00
Matt Graeber 992f980022 Removed extraneous parameters
Removed extraneous parameters

Removed the following extraneous parameters:
-PEPath
-PEUrl

The functionality they provided can be easily replicated in code outside
of Invoke-ReflectivePEInjection. i.e. it should be up to the user how
they might want to download a PE before loading it. That should not be
dictated by Invoke-ReflectivePEInjection.
2015-11-07 20:00:22 -08:00
Matt Graeber b8e831e4f9 Revert "Removed extraneous parameters"
This reverts commit 0eb520e31f.
2015-11-07 19:50:05 -08:00
Matt Graeber 0eb520e31f Removed extraneous parameters
Removed the following extraneous parameters:
-PEPath
-PEUrl
-ComputerName

The functionality they provided can be easily replicated in code outside
of Invoke-ReflectivePEInjection. i.e. it should be up to the user how
they might want to download a PE before loading it. That should not be
dictated by Invoke-ReflectivePEInjection.
2015-11-07 20:25:29 -05:00
Matt Graeber 17bfa4e276 Fixed a casting bug 2015-11-06 13:31:58 -05:00
Matt Graeber 18b7a10f89 Removing Invoke-ShellcodeMSIL
This was only ever intended to be a PoC. I'll bring this back if
requested but it exhibits duplicate functionality.
2015-11-05 13:26:05 -05:00
Matt Graeber 641eff706e Test: Ensure all scripts are not LE Unicode encoded 2015-11-05 10:36:17 -05:00
Matt Graeber d1145e0540 Re-import Invoke-Shellcode.ps1 2015-11-05 10:34:26 -05:00
Matt Graeber 81b57738ab Adding Visual Studio 2015 project file
Those who wish to load this project into VS 2015 with Adam Driscoll's
PowerShell VS extension may now do so.
2015-11-05 10:33:53 -05:00
Matt Graeber 5065810c07 Removing Metasploit integration from Invoke-Shellcode
This should have only ever been a shellcode runner. Those wishing to
integrate this with Metasploit should generate a shellcode payload with
msfvenom.
2015-11-05 10:31:40 -05:00
Matt Graeber d0fff7b637 Migrating everything back to Invoke-Shellcode.ps1. I'm done making my point now. :P 2015-11-04 14:56:46 -05:00
Matt Graeber 12ce71b9f4 Normalizing all files to ascii encoding 2015-11-04 13:48:27 -05:00
Matt Graeber 2dd1f5920d Revert "Normalizing all files to ascii encoding"
This reverts commit 5a812ce823.
2015-11-04 13:41:36 -05:00
Matt Graeber 5a812ce823 Normalizing all files to ascii encoding 2015-11-04 13:40:02 -05:00
FixTheExchange e179b2e932 Update Invoke-TokenManipulation.ps1
Removed 2 unnecessary lines.
2015-10-30 12:48:05 -05:00