Windows

Microsoft Windows

PowerSploit

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid reverse engineers, forensic analysts, and penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and scripts:

CodeExecution
Execute code on a target machine.

Invoke-DllInjection
Injects a Dll into the process ID of your choosing.

Invoke-ReflectivePEInjection
Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or reflectively injects a DLL in to a remote process.

Invoke-Shellcode
Injects shellcode into the process ID of your choosing or within PowerShell locally.

Invoke-ShellcodeMSIL
Execute shellcode within the context of the running PowerShell process without making any Win32 function calls.

Watch-BlueScreen
Cause a blue screen to occur (Windows 7 and below).

ScriptModification
Modify and/or prepare scripts for execution on a compromised machine.

Out-EncodedCommand
Compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script.

Out-CompressedDll
Compresses, Base-64 encodes, and outputs generated code to load a managed dll in memory.

Out-EncryptedScript
Encrypts text files/scripts.

Remove-Comments
Strips comments and extra whitespace from a script.

Persistence
Add persistence capabilities to a PowerShell script

New-UserPersistenceOptions
Configure user-level persistence options for the Add-Persistence function.

New-ElevatedPersistenceOptions
Configure elevated persistence options for the Add-Persistence function.

Add-Persistence
Add persistence capabilities to a script.

PETools
Parse/manipulate Windows portable executables.

Get-PEHeader
An in-memory and on-disk PE parsing utility.

Get-ObjDump
Displays information about one or more Windows object files.

Get-LibSymbols
Displays symbolic information from Windows lib files.

Get-DllLoadPath

PyForensics

Collection of single use scripts written for windows forensics

Ruby-Nessus

Ruby-Nessus is a ruby interface for the popular Nessus vulnerability scanner. Ruby-Nessus aims to deliver an easy yet powerful interface for interacting and manipulating Nessus scan results and configurations. Ruby-Nessus currently supports both version 1.0 and 2.0 of the .nessus file format.

Auto_Exploit.rb

Auto_Exploit is a replacement plugin for Metasploit's missing db_autopwn module written by Dark Operator.

XAML Spy

The visual runtime inspector for Silverlight, Windows Phone, Windows Store and WPF

Silverlight Spy

Silverlight Spy is a runtime inspector tool providing unprecedented access to all aspects of any Silverlight in-browser, out-of-browser and Windows Phone 7 application. Explore the UI element tree, monitor events, extract XAML, interactively execute DLR code, view statistics and more.

JSwat

JSwat is a graphical Java debugger front-end, written to use the Java Platform Debugger Architecture and based on the NetBeans Platform. JSwat is open-source software and is freely available in both binary and source code form. Its features include sophisticated breakpoints; colorized source code display with code navigator; movable display panels showing threads, call stack, visible variables, and loaded classes; command interface for more advanced features; and Java-like expression evaluation, including method invocation.

JavaSnoop

A tool that lets you intercept methods, alter data and otherwise test the security of Java applications on your computer.

ChapCrack

A tool for parsing MS-CHAPv2 handshakes, which can then be submitted to CloudCracker for cracking.

KnockKnock

knockknock is a simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.

Syndicate content