Skip to content
This repository was archived by the owner on Jan 21, 2021. It is now read-only.

Commit 29ae830

Browse files
author
Matt Graeber
committed
Improved root module manifest for PS Gallery
1 parent 26e0b29 commit 29ae830

File tree

1 file changed

+116
-14
lines changed

1 file changed

+116
-14
lines changed

PowerSploit.psd1

Lines changed: 116 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,29 +11,131 @@ GUID = '6753b496-d842-40a3-924a-0f09e248640c'
1111
# Author of this module
1212
Author = 'Matthew Graeber'
1313

14-
# Company or vendor of this module
15-
CompanyName = ''
16-
1714
# Copyright statement for this module
1815
Copyright = 'BSD 3-Clause'
1916

2017
# Description of the functionality provided by this module
21-
Description = 'PowerSploit Root Module'
18+
Description = 'PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement.'
2219

2320
# Minimum version of the Windows PowerShell engine required by this module
2421
PowerShellVersion = '2.0'
2522

2623
# Functions to export from this module
27-
FunctionsToExport = '*'
28-
29-
# Cmdlets to export from this module
30-
CmdletsToExport = '*'
31-
32-
# Variables to export from this module
33-
VariablesToExport = ''
34-
35-
# Aliases to export from this module
36-
AliasesToExport = ''
24+
FunctionsToExport = @(
25+
'Add-NetUser',
26+
'Add-ObjectAcl',
27+
'Add-Persistence',
28+
'Convert-NameToSid',
29+
'Convert-NT4toCanonical',
30+
'Convert-SidToName',
31+
'Copy-ClonedFile',
32+
'Find-AVSignature',
33+
'Find-ComputerField',
34+
'Find-DLLHijack',
35+
'Find-ForeignGroup',
36+
'Find-ForeignUser',
37+
'Find-GPOComputerAdmin',
38+
'Find-GPOLocation',
39+
'Find-InterestingFile',
40+
'Find-LocalAdminAccess',
41+
'Find-PathHijack',
42+
'Find-UserField',
43+
'Get-ADObject',
44+
'Get-ApplicationHost',
45+
'Get-CachedRDPConnection',
46+
'Get-ComputerDetails',
47+
'Get-ComputerProperty',
48+
'Get-DFSshare',
49+
'Get-DomainPolicy',
50+
'Get-ExploitableSystem',
51+
'Get-GPPPassword',
52+
'Get-HttpStatus',
53+
'Get-Keystrokes',
54+
'Get-LastLoggedOn',
55+
'Get-NetComputer',
56+
'Get-NetDomain',
57+
'Get-NetDomainController',
58+
'Get-NetDomainTrust',
59+
'Get-NetFileServer',
60+
'Get-NetForest',
61+
'Get-NetForestCatalog',
62+
'Get-NetForestDomain',
63+
'Get-NetForestTrust',
64+
'Get-NetGPO',
65+
'Get-NetGPOGroup',
66+
'Get-NetGroup',
67+
'Get-NetGroupMember',
68+
'Get-NetLocalGroup',
69+
'Get-NetLoggedon',
70+
'Get-NetOU',
71+
'Get-NetProcess',
72+
'Get-NetRDPSession',
73+
'Get-NetSession',
74+
'Get-NetShare',
75+
'Get-NetSite',
76+
'Get-NetSubnet',
77+
'Get-NetUser',
78+
'Get-ObjectAcl',
79+
'Get-PathAcl',
80+
'Get-Proxy',
81+
'Get-RegAlwaysInstallElevated',
82+
'Get-RegAutoLogon',
83+
'Get-SecurityPackages',
84+
'Get-ServiceDetail',
85+
'Get-ServiceFilePermission',
86+
'Get-ServicePermission',
87+
'Get-ServiceUnquoted',
88+
'Get-TimedScreenshot',
89+
'Get-UnattendedInstallFile',
90+
'Get-UserEvent',
91+
'Get-UserProperty',
92+
'Get-VaultCredential',
93+
'Get-VolumeShadowCopy',
94+
'Get-VulnAutoRun',
95+
'Get-VulnSchTask',
96+
'Get-Webconfig',
97+
'Install-ServiceBinary',
98+
'Install-SSP',
99+
'Invoke-ACLScanner',
100+
'Invoke-AllChecks',
101+
'Invoke-CheckLocalAdminAccess',
102+
'Invoke-CredentialInjection',
103+
'Invoke-DllInjection',
104+
'Invoke-EnumerateLocalAdmin',
105+
'Invoke-EventHunter',
106+
'Invoke-FileFinder',
107+
'Invoke-MapDomainTrust',
108+
'Invoke-Mimikatz',
109+
'Invoke-NinjaCopy',
110+
'Invoke-Portscan',
111+
'Invoke-ProcessHunter',
112+
'Invoke-ReflectivePEInjection',
113+
'Invoke-ReverseDnsLookup',
114+
'Invoke-ServiceAbuse',
115+
'Invoke-ShareFinder',
116+
'Invoke-Shellcode',
117+
'Invoke-TokenManipulation',
118+
'Invoke-UserHunter',
119+
'Invoke-WmiCommand',
120+
'Mount-VolumeShadowCopy',
121+
'New-ElevatedPersistenceOption',
122+
'New-UserPersistenceOption',
123+
'New-VolumeShadowCopy',
124+
'Out-CompressedDll',
125+
'Out-EncodedCommand',
126+
'Out-EncryptedScript',
127+
'Out-Minidump',
128+
'Remove-Comments',
129+
'Remove-VolumeShadowCopy',
130+
'Restore-ServiceBinary',
131+
'Set-ADObject',
132+
'Set-CriticalProcess',
133+
'Set-MacAttribute',
134+
'Set-MasterBootRecord',
135+
'Write-HijackDll',
136+
'Write-ServiceBinary',
137+
'Write-UserAddMSI'
138+
)
37139

38140
# List of all modules packaged with this module.
39141
ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'},

0 commit comments

Comments
 (0)