@@ -11,29 +11,131 @@ GUID = '6753b496-d842-40a3-924a-0f09e248640c'
11
11
# Author of this module
12
12
Author = ' Matthew Graeber'
13
13
14
- # Company or vendor of this module
15
- CompanyName = ' '
16
-
17
14
# Copyright statement for this module
18
15
Copyright = ' BSD 3-Clause'
19
16
20
17
# Description of the functionality provided by this module
21
- Description = ' PowerSploit Root Module '
18
+ Description = ' PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement. '
22
19
23
20
# Minimum version of the Windows PowerShell engine required by this module
24
21
PowerShellVersion = ' 2.0'
25
22
26
23
# Functions to export from this module
27
- FunctionsToExport = ' *'
28
-
29
- # Cmdlets to export from this module
30
- CmdletsToExport = ' *'
31
-
32
- # Variables to export from this module
33
- VariablesToExport = ' '
34
-
35
- # Aliases to export from this module
36
- AliasesToExport = ' '
24
+ FunctionsToExport = @ (
25
+ ' Add-NetUser' ,
26
+ ' Add-ObjectAcl' ,
27
+ ' Add-Persistence' ,
28
+ ' Convert-NameToSid' ,
29
+ ' Convert-NT4toCanonical' ,
30
+ ' Convert-SidToName' ,
31
+ ' Copy-ClonedFile' ,
32
+ ' Find-AVSignature' ,
33
+ ' Find-ComputerField' ,
34
+ ' Find-DLLHijack' ,
35
+ ' Find-ForeignGroup' ,
36
+ ' Find-ForeignUser' ,
37
+ ' Find-GPOComputerAdmin' ,
38
+ ' Find-GPOLocation' ,
39
+ ' Find-InterestingFile' ,
40
+ ' Find-LocalAdminAccess' ,
41
+ ' Find-PathHijack' ,
42
+ ' Find-UserField' ,
43
+ ' Get-ADObject' ,
44
+ ' Get-ApplicationHost' ,
45
+ ' Get-CachedRDPConnection' ,
46
+ ' Get-ComputerDetails' ,
47
+ ' Get-ComputerProperty' ,
48
+ ' Get-DFSshare' ,
49
+ ' Get-DomainPolicy' ,
50
+ ' Get-ExploitableSystem' ,
51
+ ' Get-GPPPassword' ,
52
+ ' Get-HttpStatus' ,
53
+ ' Get-Keystrokes' ,
54
+ ' Get-LastLoggedOn' ,
55
+ ' Get-NetComputer' ,
56
+ ' Get-NetDomain' ,
57
+ ' Get-NetDomainController' ,
58
+ ' Get-NetDomainTrust' ,
59
+ ' Get-NetFileServer' ,
60
+ ' Get-NetForest' ,
61
+ ' Get-NetForestCatalog' ,
62
+ ' Get-NetForestDomain' ,
63
+ ' Get-NetForestTrust' ,
64
+ ' Get-NetGPO' ,
65
+ ' Get-NetGPOGroup' ,
66
+ ' Get-NetGroup' ,
67
+ ' Get-NetGroupMember' ,
68
+ ' Get-NetLocalGroup' ,
69
+ ' Get-NetLoggedon' ,
70
+ ' Get-NetOU' ,
71
+ ' Get-NetProcess' ,
72
+ ' Get-NetRDPSession' ,
73
+ ' Get-NetSession' ,
74
+ ' Get-NetShare' ,
75
+ ' Get-NetSite' ,
76
+ ' Get-NetSubnet' ,
77
+ ' Get-NetUser' ,
78
+ ' Get-ObjectAcl' ,
79
+ ' Get-PathAcl' ,
80
+ ' Get-Proxy' ,
81
+ ' Get-RegAlwaysInstallElevated' ,
82
+ ' Get-RegAutoLogon' ,
83
+ ' Get-SecurityPackages' ,
84
+ ' Get-ServiceDetail' ,
85
+ ' Get-ServiceFilePermission' ,
86
+ ' Get-ServicePermission' ,
87
+ ' Get-ServiceUnquoted' ,
88
+ ' Get-TimedScreenshot' ,
89
+ ' Get-UnattendedInstallFile' ,
90
+ ' Get-UserEvent' ,
91
+ ' Get-UserProperty' ,
92
+ ' Get-VaultCredential' ,
93
+ ' Get-VolumeShadowCopy' ,
94
+ ' Get-VulnAutoRun' ,
95
+ ' Get-VulnSchTask' ,
96
+ ' Get-Webconfig' ,
97
+ ' Install-ServiceBinary' ,
98
+ ' Install-SSP' ,
99
+ ' Invoke-ACLScanner' ,
100
+ ' Invoke-AllChecks' ,
101
+ ' Invoke-CheckLocalAdminAccess' ,
102
+ ' Invoke-CredentialInjection' ,
103
+ ' Invoke-DllInjection' ,
104
+ ' Invoke-EnumerateLocalAdmin' ,
105
+ ' Invoke-EventHunter' ,
106
+ ' Invoke-FileFinder' ,
107
+ ' Invoke-MapDomainTrust' ,
108
+ ' Invoke-Mimikatz' ,
109
+ ' Invoke-NinjaCopy' ,
110
+ ' Invoke-Portscan' ,
111
+ ' Invoke-ProcessHunter' ,
112
+ ' Invoke-ReflectivePEInjection' ,
113
+ ' Invoke-ReverseDnsLookup' ,
114
+ ' Invoke-ServiceAbuse' ,
115
+ ' Invoke-ShareFinder' ,
116
+ ' Invoke-Shellcode' ,
117
+ ' Invoke-TokenManipulation' ,
118
+ ' Invoke-UserHunter' ,
119
+ ' Invoke-WmiCommand' ,
120
+ ' Mount-VolumeShadowCopy' ,
121
+ ' New-ElevatedPersistenceOption' ,
122
+ ' New-UserPersistenceOption' ,
123
+ ' New-VolumeShadowCopy' ,
124
+ ' Out-CompressedDll' ,
125
+ ' Out-EncodedCommand' ,
126
+ ' Out-EncryptedScript' ,
127
+ ' Out-Minidump' ,
128
+ ' Remove-Comments' ,
129
+ ' Remove-VolumeShadowCopy' ,
130
+ ' Restore-ServiceBinary' ,
131
+ ' Set-ADObject' ,
132
+ ' Set-CriticalProcess' ,
133
+ ' Set-MacAttribute' ,
134
+ ' Set-MasterBootRecord' ,
135
+ ' Write-HijackDll' ,
136
+ ' Write-ServiceBinary' ,
137
+ ' Write-UserAddMSI'
138
+ )
37
139
38
140
# List of all modules packaged with this module.
39
141
ModuleList = @ ( @ {ModuleName = ' AntivirusBypass' ; ModuleVersion = ' 1.0.0.0' ; GUID = ' 7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b' },
0 commit comments