PowerSploit

PowerSploit is a group of PowerShell modules used for security audits and penetration testing. It offers a range of tools that penetration testers and security experts may utilise throughout the various stages of an evaluation. Code execution, antivirus bypass, exfiltration, persistence, privilege escalation, reconnaissance, and other topics are covered in the modules.

PowerSploit is a comprehensive collection of PowerShell modules specifically crafted for penetration testing and security assessments. It offers a diverse range of tools that can be employed by penetration testers and security professionals throughout various stages of an assessment. The modules encompass numerous areas of interest, including code execution, antivirus bypass, data exfiltration, persistence mechanisms, privilege escalation, reconnaissance, and more. PowerSploit serves as a valuable resource for security experts to assess and strengthen the security of systems and networks.

‍Installation

To install the PowerSploit module, you can follow these general steps:

1.      Downloador clone the PowerSploit repository.

2.      Dropthe entire PowerSploit folder into one of your PowerShell module directories.The default paths are typically listed in the $Env:PSModulePathenvironment variable.

·        The default per-user module path is: $Env:HomeDrive$Env:HOMEPATH\Documents\WindowsPowerShell\Modules

·        The default computer-level module path is: $Env:windir\System32\WindowsPowerShell\v1.0\Modules

3.      Onceyou've placed PowerSploit into your module path, you may need to unblock thefiles using a one-liner like the following:

·        $Env:PSModulePath.Split(';') | ForEach-Object {if (Test-Path (Join-Path $_ PowerSploit)) { Get-ChildItem $_ -Recurse |Unblock-File } }

How to Use

·        After installation, you can import thePowerSploit module using the command: Import-Module PowerSploit.

·        To see the imported commands, you can use: Get-Command-Module PowerSploit.

·        For detailed usage information on eachindividual script or function, refer to the comment-based help within eachscript.

Additional Information

·        The project follows a BSD 3-Clause licenseunless explicitly noted otherwise.

·        Contributions to the project are welcome, but contributors are expected to follow certain guidelines outlined in the project's documentation.

·        The script style guide provides recommendations on writing scripts/modules, including avoiding the use of Write-Host and providing comment-based help.

Table of Contents: