rvrsh3ll
b703e13614
Added HTTP-Login Recon Module
2015-11-23 08:50:58 -05:00
Harmj0y
aa9c9e804e
Added management/invoke_script
2015-11-22 17:36:57 -05:00
Harmj0y
2c14853b29
Fix for exploitation/exploit_jboss
2015-11-21 18:07:57 -05:00
rvrsh3ll
b8d34090fe
Added JBoss JMX Console exploit deployment module.
2015-11-20 12:37:19 -05:00
Harmj0y
8961af6262
Added situational_awareness/network/powerview/get_loggedon and get_session
2015-11-12 23:17:37 -05:00
Harmj0y
6058f25a57
few tweaks to recon/find_fruit
2015-11-08 20:40:07 -05:00
HarmJ0y
c68177cff7
Merge pull request #87 from rvrsh3ll/master
...
Threading Updates
2015-11-08 20:37:41 -05:00
Harmj0y
c9afcc138f
Updated PowerView, added situational_awareness/network/powerview/get_forest
2015-11-08 19:36:20 -05:00
Harmj0y
7db7ec6bbc
All PowerUp modules now dynamically built from a single source file
...
PowerUp bug fixes
Added privesc/powerup/service_exe_restore, pulled logic from other modules
Added management/spawnas to spawn agents with explicit credentials
Debug functionality (--debug) now outputs the source of the last tasked script to ./LastTask.ps1
Write-Verbose and Write-Debug lines now stripped from tasked scripts
2015-11-08 18:51:57 -05:00
rvrsh3ll
746f390a1d
Added Threading
...
Added FoundOnly
2015-11-08 08:10:32 -05:00
Harmj0y
3315c106ba
Renamed privesc/directuac to privesc/ask
...
Added local admin priv and opsec checks
2015-11-05 13:06:36 -05:00
João Pena Gil
6adfacf8f6
Privesc - DirectUAC
...
Added DirectUAC module.
Description:
Leverages Start-Process' -Verb runAs option inside a loop to prompt the user for a high integrity context before running the agent code.
UAC will report Powershell is requesting Administrator privileges. Because this does not use the BypassUAC DLLs, it should not trigger any AV alerts.
2015-11-05 09:53:34 +00:00
Harmj0y
4e95039bc4
added persistence/misc/add_netuser to add local/domain users
2015-11-04 15:19:06 -05:00
Harmj0y
c26a63ad94
marked module option as not required
2015-10-30 13:51:59 -04:00
Harmj0y
581c9aa948
Moved antivirusproduct to situational_awareness/host/antivirusproduct ,
...
added ComputerName option, output pipeline fix.
2015-10-30 13:39:25 -04:00
Mharcos Nesster
95ef63fb74
added module collection/Get-AntiVirusProduct
2015-10-30 00:22:16 -02:00
pasv
d6daa45646
Merge branch 'master' into module_dev_paranoia
2015-10-28 23:39:38 -04:00
Harmj0y
e62c5866c0
Moved Find-Fruit.ps1 source to ./data/module_source/recon/*
...
Output tweak for find_fruit, added ShowAll flag
2015-10-28 13:52:35 -04:00
HarmJ0y
8ac51073e6
Merge pull request #69 from rvrsh3ll/master
...
Added find-fruit.py
2015-10-28 13:41:34 -04:00
Steve Borosh
c948fcdbfb
Parameter fixes
2015-10-27 17:43:01 -04:00
Harmj0y
4ceafec807
add_sid_history Groups bug fix
2015-10-27 14:48:43 -04:00
Steve Borosh
2855b3e045
Fix
2015-10-24 22:58:38 -04:00
Steve Borosh
d66c511252
Added find-fruit.py
2015-10-24 22:09:35 -04:00
Harmj0y
0cbdb165a2
-Updated powerview.ps1 source to Version 2.0
...
-Built a way to dynamically generate the stripped PowerView code for functions needed by PowerView modules (helpers -> generate_dynamic_powershell_script), and updated all relevant PowerView modules
-Renamed PowerView modules to better match PowerView 2.0 naming scheme and moved to situational_awareness/network/powerview/*
-Removed old split-out PowerView source files
-Removed situational_awareness/network/netview
-Combined stealth_userhunter into option for userhunter
-Added situational_awareness/network/get_forest_domain, situational_awareness/network/powerview/get_object_acl, situational_awareness/network/powerview/find_computer_field, situational_awareness/network/powerview/find_user_field, situational_awareness/network/powerview/get_ou, situational_awareness/network/powerview/get_group, situational_awareness/network/powerview/get_group_member, situational_awareness/network/powerview/get_gpo, situational_awareness/network/powerview/find_gpo_location, situational_awareness/network/powerview/find_gpo_computer_admin, situational_awareness/network/powerview/process_hunter, situational_awareness/network/powerview/find_foreign_group, situational_awareness/network/powerview/find_foreign_user
-renamed collection/filesearch to collection/find_interesting_file
2015-10-23 21:40:06 -04:00
enigma0x3
2cb68f2da6
Update prompt.py
2015-10-14 17:12:53 -04:00
enigma0x3
d5344b6716
Merge pull request #51 from xorrior/master
...
Modified Invoke-WinEnum
2015-10-13 06:56:12 -04:00
enigma0x3
4f413b1a98
Updated name so the script loads correctly.
2015-10-12 17:26:59 -04:00
enigma0x3
a46bdac77d
Updated to remove testing code and return "script"
2015-10-08 19:24:08 -04:00
xorrior
7541ea23e8
Modified Invoke-WinEnum
...
Added Firewall Rules enumeration. Slightly modified file searches to
only pull files owned by the user. Changed formatting.
2015-09-14 16:34:32 -04:00
Harmj0y
ed8c476f43
Added credentials/mimikatz/mimitokens to take advantage of Mimikatz' token listing/elevation
...
Added management/enable_multi_rdp to patch terminal services to allow mutiple connections
2015-09-12 08:32:43 -04:00
Harmj0y
140c4baf7a
Fixed write_dllhijacker.
2015-09-12 08:23:12 -04:00
enigma0x3
629c8f695c
Updated to change comment wording
2015-09-03 07:55:48 -04:00
pasv
22dea0ba0a
Fixed module template to reflect required OutputExtension parameter
2015-09-03 04:05:45 -04:00
pasv
875284be7a
Working release
2015-09-03 03:44:34 -04:00
Harmj0y
fd1d17a647
Added /dc option to credentials/mimikatz/dcsync
2015-09-02 21:43:01 -04:00
Jack64
d06370e4f1
fix hard-coded event subscription name
...
Before this change, the command
` set SubName `
did not change the event subscription name installed by the agent as instructed by the user.
2015-08-31 15:45:38 +01:00
HarmJ0y
8eaf601ea5
Merge pull request #33 from PowerShellEmpire/inveigh
...
Integration of Kevin Robertson's Inveigh project
2015-08-26 17:23:52 -04:00
enigma0x3
d3fc5137d4
added privesc/bypassuac_wscript
2015-08-25 21:18:48 -04:00
Harmj0y
fb9c18769f
Added collection/inveigh.
2015-08-25 17:21:59 -04:00
Harmj0y
b2cca2f3fd
Added credentials/mimikatz/dcsync for remote DC credential extraction
...
Added situational_awareness/network/get_domaintrusts
Added /sids argument for credentials/mimikatz/golden_ticket
Added credential parsing for dcsync output
updated links for PowerTools
2015-08-24 17:33:35 -04:00
Harmj0y
59633fefa1
More bug fixes for lsadump::dcsync.
2015-08-24 01:45:04 -04:00
Harmj0y
683e6403c3
Added -Domain option for lsadump::dcsync in credentials/mimikatz/dcsync
2015-08-24 01:33:12 -04:00
Harmj0y
be637dd38a
Updated .dll for Invoke-Mimikatz, including lsadump::dcsync functionality.
2015-08-24 01:28:11 -04:00
Harmj0y
23a3aa3f07
Added management/zipfolder for folder zipping/exfiltration.
2015-08-19 14:56:00 -04:00
Harmj0y
46bf3040f0
Added collection/packet_capture to use netsh to initiate a packet capture.
2015-08-19 12:57:35 -04:00
Harmj0y
f07a4d4a3f
Added collection/netripper implementation of the NetRipper project from Ionut Popescu (@NytroRST)
2015-08-18 21:09:05 -04:00
Harmj0y
6ddce8bb7e
Added lateral_movement/invoke_psexec
2015-08-16 10:46:22 -04:00
Harmj0y
2b499a559c
Added modules management/timestomp, trollsploit/process_killer, persistence/elevated/wmi, situational_awareness/network/smbscanner
2015-08-16 10:46:12 -04:00
enigma0x3
3ade74603f
Update schtasks.py
...
fixed registry storage
2015-08-14 09:43:12 -04:00
enigma0x3
afe64910a3
Update registry.py
...
Updated to fix execution of registry key
fixed registry parsing
2015-08-14 09:43:02 -04:00
enigma0x3
52de78bfc3
Update registry.py
...
Made listener requiered.
2015-08-14 09:42:55 -04:00
Harmj0y
02c25719a1
Few bug fixes for the LostAgentDetection code.
2015-08-14 09:42:54 -04:00
Harmj0y
629c648c2b
Updated citataions and documentation.
2015-08-08 12:06:44 -04:00
enigma0x3
175d8df7f0
Update userhunter.py
2015-08-06 04:08:50 -04:00
enigma0x3
fb6c28bd3b
Update stealth_userhunter.py
2015-08-06 04:08:37 -04:00
enigma0x3
174e767721
Update sharefinder.py
2015-08-06 04:08:22 -04:00
enigma0x3
c911a5c478
Update reverse_dns.py
2015-08-06 04:08:08 -04:00
enigma0x3
d8dbcc7eea
Update portscan.py
2015-08-06 04:07:51 -04:00
enigma0x3
d1d9ba6e36
Update netview.py
2015-08-06 04:07:34 -04:00
enigma0x3
0f3607ad9a
Update mapdomaintrusts.py
2015-08-06 04:07:15 -04:00
enigma0x3
508c39c3fe
Update get_user.py
2015-08-06 04:06:58 -04:00
enigma0x3
65a25425cf
Update get_spn.py
2015-08-06 04:06:40 -04:00
enigma0x3
fd5d181b9d
Update get_localgroup.py
2015-08-06 04:06:19 -04:00
enigma0x3
63ec7e252b
Update get_exploitable_systems.py
2015-08-06 04:06:02 -04:00
enigma0x3
1915ee033a
Update get_computer.py
2015-08-06 04:05:30 -04:00
enigma0x3
9c3b2192e4
Update find_localadmin_access.py
2015-08-06 04:05:11 -04:00
enigma0x3
8d9bdf272b
Update arpscan.py
2015-08-06 04:04:46 -04:00
Jared Haight
ca0a2e1bdf
Fixed file path typo
2015-08-05 21:19:44 -04:00
Jared Haight
e3148de261
Fixed file path typo
2015-08-05 21:19:18 -04:00
Harmj0y
751d0c15d6
Initial BSidesLV '15 release of v1.0.0
2015-08-05 14:36:39 -04:00