@@ -11,29 +11,131 @@ GUID = '6753b496-d842-40a3-924a-0f09e248640c'
1111# Author of this module
1212Author = ' Matthew Graeber'
1313
14- # Company or vendor of this module
15- CompanyName = ' '
16-
1714# Copyright statement for this module
1815Copyright = ' BSD 3-Clause'
1916
2017# Description of the functionality provided by this module
21- Description = ' PowerSploit Root Module '
18+ Description = ' PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement. '
2219
2320# Minimum version of the Windows PowerShell engine required by this module
2421PowerShellVersion = ' 2.0'
2522
2623# Functions to export from this module
27- FunctionsToExport = ' *'
28-
29- # Cmdlets to export from this module
30- CmdletsToExport = ' *'
31-
32- # Variables to export from this module
33- VariablesToExport = ' '
34-
35- # Aliases to export from this module
36- AliasesToExport = ' '
24+ FunctionsToExport = @ (
25+ ' Add-NetUser' ,
26+ ' Add-ObjectAcl' ,
27+ ' Add-Persistence' ,
28+ ' Convert-NameToSid' ,
29+ ' Convert-NT4toCanonical' ,
30+ ' Convert-SidToName' ,
31+ ' Copy-ClonedFile' ,
32+ ' Find-AVSignature' ,
33+ ' Find-ComputerField' ,
34+ ' Find-DLLHijack' ,
35+ ' Find-ForeignGroup' ,
36+ ' Find-ForeignUser' ,
37+ ' Find-GPOComputerAdmin' ,
38+ ' Find-GPOLocation' ,
39+ ' Find-InterestingFile' ,
40+ ' Find-LocalAdminAccess' ,
41+ ' Find-PathHijack' ,
42+ ' Find-UserField' ,
43+ ' Get-ADObject' ,
44+ ' Get-ApplicationHost' ,
45+ ' Get-CachedRDPConnection' ,
46+ ' Get-ComputerDetails' ,
47+ ' Get-ComputerProperty' ,
48+ ' Get-DFSshare' ,
49+ ' Get-DomainPolicy' ,
50+ ' Get-ExploitableSystem' ,
51+ ' Get-GPPPassword' ,
52+ ' Get-HttpStatus' ,
53+ ' Get-Keystrokes' ,
54+ ' Get-LastLoggedOn' ,
55+ ' Get-NetComputer' ,
56+ ' Get-NetDomain' ,
57+ ' Get-NetDomainController' ,
58+ ' Get-NetDomainTrust' ,
59+ ' Get-NetFileServer' ,
60+ ' Get-NetForest' ,
61+ ' Get-NetForestCatalog' ,
62+ ' Get-NetForestDomain' ,
63+ ' Get-NetForestTrust' ,
64+ ' Get-NetGPO' ,
65+ ' Get-NetGPOGroup' ,
66+ ' Get-NetGroup' ,
67+ ' Get-NetGroupMember' ,
68+ ' Get-NetLocalGroup' ,
69+ ' Get-NetLoggedon' ,
70+ ' Get-NetOU' ,
71+ ' Get-NetProcess' ,
72+ ' Get-NetRDPSession' ,
73+ ' Get-NetSession' ,
74+ ' Get-NetShare' ,
75+ ' Get-NetSite' ,
76+ ' Get-NetSubnet' ,
77+ ' Get-NetUser' ,
78+ ' Get-ObjectAcl' ,
79+ ' Get-PathAcl' ,
80+ ' Get-Proxy' ,
81+ ' Get-RegAlwaysInstallElevated' ,
82+ ' Get-RegAutoLogon' ,
83+ ' Get-SecurityPackages' ,
84+ ' Get-ServiceDetail' ,
85+ ' Get-ServiceFilePermission' ,
86+ ' Get-ServicePermission' ,
87+ ' Get-ServiceUnquoted' ,
88+ ' Get-TimedScreenshot' ,
89+ ' Get-UnattendedInstallFile' ,
90+ ' Get-UserEvent' ,
91+ ' Get-UserProperty' ,
92+ ' Get-VaultCredential' ,
93+ ' Get-VolumeShadowCopy' ,
94+ ' Get-VulnAutoRun' ,
95+ ' Get-VulnSchTask' ,
96+ ' Get-Webconfig' ,
97+ ' Install-ServiceBinary' ,
98+ ' Install-SSP' ,
99+ ' Invoke-ACLScanner' ,
100+ ' Invoke-AllChecks' ,
101+ ' Invoke-CheckLocalAdminAccess' ,
102+ ' Invoke-CredentialInjection' ,
103+ ' Invoke-DllInjection' ,
104+ ' Invoke-EnumerateLocalAdmin' ,
105+ ' Invoke-EventHunter' ,
106+ ' Invoke-FileFinder' ,
107+ ' Invoke-MapDomainTrust' ,
108+ ' Invoke-Mimikatz' ,
109+ ' Invoke-NinjaCopy' ,
110+ ' Invoke-Portscan' ,
111+ ' Invoke-ProcessHunter' ,
112+ ' Invoke-ReflectivePEInjection' ,
113+ ' Invoke-ReverseDnsLookup' ,
114+ ' Invoke-ServiceAbuse' ,
115+ ' Invoke-ShareFinder' ,
116+ ' Invoke-Shellcode' ,
117+ ' Invoke-TokenManipulation' ,
118+ ' Invoke-UserHunter' ,
119+ ' Invoke-WmiCommand' ,
120+ ' Mount-VolumeShadowCopy' ,
121+ ' New-ElevatedPersistenceOption' ,
122+ ' New-UserPersistenceOption' ,
123+ ' New-VolumeShadowCopy' ,
124+ ' Out-CompressedDll' ,
125+ ' Out-EncodedCommand' ,
126+ ' Out-EncryptedScript' ,
127+ ' Out-Minidump' ,
128+ ' Remove-Comments' ,
129+ ' Remove-VolumeShadowCopy' ,
130+ ' Restore-ServiceBinary' ,
131+ ' Set-ADObject' ,
132+ ' Set-CriticalProcess' ,
133+ ' Set-MacAttribute' ,
134+ ' Set-MasterBootRecord' ,
135+ ' Write-HijackDll' ,
136+ ' Write-ServiceBinary' ,
137+ ' Write-UserAddMSI'
138+ )
37139
38140# List of all modules packaged with this module.
39141ModuleList = @ ( @ {ModuleName = ' AntivirusBypass' ; ModuleVersion = ' 1.0.0.0' ; GUID = ' 7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b' },
0 commit comments