PowerSploit.psd1
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'PowerSploit.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '6753b496-d842-40a3-924a-0f09e248640c' # Author of this module Author = 'Matthew Graeber' # Copyright statement for this module Copyright = 'BSD 3-Clause' # Description of the functionality provided by this module Description = 'PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers and red team operator during all phases of an engagement.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Functions to export from this module FunctionsToExport = @( 'Add-NetUser', 'Add-ObjectAcl', 'Add-Persistence', 'Convert-NameToSid', 'Convert-NT4toCanonical', 'Convert-SidToName', 'Copy-ClonedFile', 'Find-AVSignature', 'Find-ComputerField', 'Find-DLLHijack', 'Find-ForeignGroup', 'Find-ForeignUser', 'Find-GPOComputerAdmin', 'Find-GPOLocation', 'Find-InterestingFile', 'Find-LocalAdminAccess', 'Find-PathHijack', 'Find-UserField', 'Get-ADObject', 'Get-ApplicationHost', 'Get-CachedRDPConnection', 'Get-ComputerDetails', 'Get-ComputerProperty', 'Get-DFSshare', 'Get-DomainPolicy', 'Get-ExploitableSystem', 'Get-GPPPassword', 'Get-HttpStatus', 'Get-Keystrokes', 'Get-LastLoggedOn', 'Get-NetComputer', 'Get-NetDomain', 'Get-NetDomainController', 'Get-NetDomainTrust', 'Get-NetFileServer', 'Get-NetForest', 'Get-NetForestCatalog', 'Get-NetForestDomain', 'Get-NetForestTrust', 'Get-NetGPO', 'Get-NetGPOGroup', 'Get-NetGroup', 'Get-NetGroupMember', 'Get-NetLocalGroup', 'Get-NetLoggedon', 'Get-NetOU', 'Get-NetProcess', 'Get-NetRDPSession', 'Get-NetSession', 'Get-NetShare', 'Get-NetSite', 'Get-NetSubnet', 'Get-NetUser', 'Get-ObjectAcl', 'Get-PathAcl', 'Get-Proxy', 'Get-RegAlwaysInstallElevated', 'Get-RegAutoLogon', 'Get-SecurityPackages', 'Get-ServiceDetail', 'Get-ServiceFilePermission', 'Get-ServicePermission', 'Get-ServiceUnquoted', 'Get-TimedScreenshot', 'Get-UnattendedInstallFile', 'Get-UserEvent', 'Get-UserProperty', 'Get-VaultCredential', 'Get-VolumeShadowCopy', 'Get-VulnAutoRun', 'Get-VulnSchTask', 'Get-Webconfig', 'Install-ServiceBinary', 'Install-SSP', 'Invoke-ACLScanner', 'Invoke-AllChecks', 'Invoke-CheckLocalAdminAccess', 'Invoke-CredentialInjection', 'Invoke-DllInjection', 'Invoke-EnumerateLocalAdmin', 'Invoke-EventHunter', 'Invoke-FileFinder', 'Invoke-MapDomainTrust', 'Invoke-Mimikatz', 'Invoke-NinjaCopy', 'Invoke-Portscan', 'Invoke-ProcessHunter', 'Invoke-ReflectivePEInjection', 'Invoke-ReverseDnsLookup', 'Invoke-ServiceAbuse', 'Invoke-ShareFinder', 'Invoke-Shellcode', 'Invoke-TokenManipulation', 'Invoke-UserHunter', 'Invoke-WmiCommand', 'Mount-VolumeShadowCopy', 'New-ElevatedPersistenceOption', 'New-UserPersistenceOption', 'New-VolumeShadowCopy', 'Out-CompressedDll', 'Out-EncodedCommand', 'Out-EncryptedScript', 'Out-Minidump', 'Remove-Comments', 'Remove-VolumeShadowCopy', 'Restore-ServiceBinary', 'Set-ADObject', 'Set-CriticalProcess', 'Set-MacAttribute', 'Set-MasterBootRecord', 'Write-HijackDll', 'Write-ServiceBinary', 'Write-UserAddMSI' ) # List of all modules packaged with this module. ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '3.0.0.0'; GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'}, @{ModuleName = 'CodeExecution'; ModuleVersion = '3.0.0.0'; GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'}, @{ModuleName = 'Exfiltration'; ModuleVersion = '3.0.0.0'; GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a'}, @{ModuleName = 'Recon'; ModuleVersion = '3.0.0.0'; GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'}, @{ModuleName = 'ScriptModification'; ModuleVersion = '3.0.0.0'; GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'}, @{ModuleName = 'Persistence'; ModuleVersion = '3.0.0.0'; GUID = '633d0f10-a056-41da-869d-6d2f75430195'}, @{ModuleName = 'PrivEsc'; ModuleVersion = '3.0.0.0'; GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'} ) PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = @('security','pentesting','red team','offense') # A URL to the license for this module. LicenseUri = 'http://www.apache.org/licenses/LICENSE-2.0.html' # A URL to the main website for this project. ProjectUri = 'https://github.com/PowerShellMafia/PowerSploit' } } } |