175 lines
5.2 KiB
PowerShell
175 lines
5.2 KiB
PowerShell
@{
|
|
# Script module or binary module file associated with this manifest.
|
|
ModuleToProcess = 'PowerSploit.psm1'
|
|
|
|
# Version number of this module.
|
|
ModuleVersion = '3.0.0.0'
|
|
|
|
# ID used to uniquely identify this module
|
|
GUID = '6753b496-d842-40a3-924a-0f09e248640c'
|
|
|
|
# Author of this module
|
|
Author = 'Matthew Graeber'
|
|
|
|
# Copyright statement for this module
|
|
Copyright = 'BSD 3-Clause'
|
|
|
|
# Description of the functionality provided by this module
|
|
Description = 'PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement.'
|
|
|
|
# Minimum version of the Windows PowerShell engine required by this module
|
|
PowerShellVersion = '2.0'
|
|
|
|
# Functions to export from this module
|
|
FunctionsToExport = @(
|
|
'Add-NetUser',
|
|
'Add-ObjectAcl',
|
|
'Add-Persistence',
|
|
'Add-ServiceDacl',
|
|
'Convert-NameToSid',
|
|
'Convert-NT4toCanonical',
|
|
'Convert-SidToName',
|
|
'Copy-ClonedFile',
|
|
'Find-AVSignature',
|
|
'Find-ComputerField',
|
|
'Find-ForeignGroup',
|
|
'Find-ForeignUser',
|
|
'Find-GPOComputerAdmin',
|
|
'Find-GPOLocation',
|
|
'Find-InterestingFile',
|
|
'Find-LocalAdminAccess',
|
|
'Find-PathDLLHijack',
|
|
'Find-ProcessDLLHijack',
|
|
'Find-ManagedSecurityGroups',
|
|
'Find-UserField',
|
|
'Get-ADObject',
|
|
'Get-ApplicationHost',
|
|
'Get-CachedRDPConnection',
|
|
'Get-ComputerDetails',
|
|
'Get-ComputerProperty',
|
|
'Get-CurrentUserTokenGroupSid',
|
|
'Get-DFSshare',
|
|
'Get-DomainPolicy',
|
|
'Get-ExploitableSystem',
|
|
'Get-GPPPassword',
|
|
'Get-HttpStatus',
|
|
'Get-Keystrokes',
|
|
'Get-LastLoggedOn',
|
|
'Get-ModifiablePath',
|
|
'Get-ModifiableRegistryAutoRun',
|
|
'Get-ModifiableScheduledTaskFile',
|
|
'Get-ModifiableService',
|
|
'Get-ModifiableServiceFile',
|
|
'Get-NetComputer',
|
|
'Get-NetDomain',
|
|
'Get-NetDomainController',
|
|
'Get-NetDomainTrust',
|
|
'Get-NetFileServer',
|
|
'Get-NetForest',
|
|
'Get-NetForestCatalog',
|
|
'Get-NetForestDomain',
|
|
'Get-NetForestTrust',
|
|
'Get-NetGPO',
|
|
'Get-NetGPOGroup',
|
|
'Get-NetGroup',
|
|
'Get-NetGroupMember',
|
|
'Get-NetLocalGroup',
|
|
'Get-NetLoggedon',
|
|
'Get-NetOU',
|
|
'Get-NetProcess',
|
|
'Get-NetRDPSession',
|
|
'Get-NetSession',
|
|
'Get-NetShare',
|
|
'Get-NetSite',
|
|
'Get-NetSubnet',
|
|
'Get-NetUser',
|
|
'Get-ObjectAcl',
|
|
'Get-PathAcl',
|
|
'Get-Proxy',
|
|
'Get-RegistryAlwaysInstallElevated',
|
|
'Get-RegistryAutoLogon',
|
|
'Get-SecurityPackages',
|
|
'Get-ServiceDetail',
|
|
'Get-SiteListPassword',
|
|
'Get-System',
|
|
'Get-TimedScreenshot',
|
|
'Get-UnattendedInstallFile',
|
|
'Get-UnquotedService',
|
|
'Get-UserEvent',
|
|
'Get-UserProperty',
|
|
'Get-VaultCredential',
|
|
'Get-VolumeShadowCopy',
|
|
'Get-Webconfig',
|
|
'Install-ServiceBinary',
|
|
'Install-SSP',
|
|
'Invoke-ACLScanner',
|
|
'Invoke-CheckLocalAdminAccess',
|
|
'Invoke-CredentialInjection',
|
|
'Invoke-DllInjection',
|
|
'Invoke-EnumerateLocalAdmin',
|
|
'Invoke-EventHunter',
|
|
'Invoke-FileFinder',
|
|
'Invoke-MapDomainTrust',
|
|
'Invoke-Mimikatz',
|
|
'Invoke-NinjaCopy',
|
|
'Invoke-Portscan',
|
|
'Invoke-PrivescAudit',
|
|
'Invoke-ProcessHunter',
|
|
'Invoke-ReflectivePEInjection',
|
|
'Invoke-ReverseDnsLookup',
|
|
'Invoke-ServiceAbuse',
|
|
'Invoke-ShareFinder',
|
|
'Invoke-Shellcode',
|
|
'Invoke-TokenManipulation',
|
|
'Invoke-UserHunter',
|
|
'Invoke-WmiCommand',
|
|
'Mount-VolumeShadowCopy',
|
|
'New-ElevatedPersistenceOption',
|
|
'New-UserPersistenceOption',
|
|
'New-VolumeShadowCopy',
|
|
'Out-CompressedDll',
|
|
'Out-EncodedCommand',
|
|
'Out-EncryptedScript',
|
|
'Out-Minidump',
|
|
'Remove-Comments',
|
|
'Remove-VolumeShadowCopy',
|
|
'Restore-ServiceBinary',
|
|
'Set-ADObject',
|
|
'Set-CriticalProcess',
|
|
'Set-MacAttribute',
|
|
'Set-MasterBootRecord',
|
|
'Set-ServiceBinPath',
|
|
'Test-ServiceDaclPermission',
|
|
'Write-HijackDll',
|
|
'Write-ServiceBinary',
|
|
'Write-UserAddMSI'
|
|
)
|
|
|
|
# List of all modules packaged with this module.
|
|
ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '3.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'},
|
|
@{ModuleName = 'CodeExecution'; ModuleVersion = '3.0.0.0'; GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'},
|
|
@{ModuleName = 'Exfiltration'; ModuleVersion = '3.0.0.0'; GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a'},
|
|
@{ModuleName = 'Recon'; ModuleVersion = '3.0.0.0'; GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'},
|
|
@{ModuleName = 'ScriptModification'; ModuleVersion = '3.0.0.0'; GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'},
|
|
@{ModuleName = 'Persistence'; ModuleVersion = '3.0.0.0'; GUID = '633d0f10-a056-41da-869d-6d2f75430195'},
|
|
@{ModuleName = 'PrivEsc'; ModuleVersion = '3.0.0.0'; GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'} )
|
|
|
|
PrivateData = @{
|
|
|
|
PSData = @{
|
|
|
|
# Tags applied to this module. These help with module discovery in online galleries.
|
|
Tags = @('security','pentesting','red team','offense')
|
|
|
|
# A URL to the license for this module.
|
|
LicenseUri = 'http://www.apache.org/licenses/LICENSE-2.0.html'
|
|
|
|
# A URL to the main website for this project.
|
|
ProjectUri = 'https://github.com/PowerShellMafia/PowerSploit'
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|