Powershell Framework

  •        65

The Powershell Framework makes running Powershell scripts simple. It provides a means of interactively or non-interactively running scripts in a simple manner. It provides a form based interface to browse and run scripts, and a clean framework for writing scripts.

http://posh.codeplex.com/

Tags
Implementation
License
Platform

   




Related Projects

Powershell Depo

  •    

This a collection of Powershell scripts that are collected and modified from anywhere and everywhere. Feel free to download whatever you need.

Posh-SSH - PowerShell Module for automating tasks on remote systems using SSH

  •    CSharp

Windows Powershell module that leverages a custom version of the SSH.NET Library http://sshnet.codeplex.com/ to provide basic SSH functionality in Powershell. The main purpose of the module is to facilitate automating actions against one or multiple SSH enabled servers. This module is for Windows PowerShell 3.0 or above. It is compiled for .NET Framework 4.5.

PowerShell WMI Extensions (Beta)

  •    

Expose WMI classes as rich PowerShell commands with detailed documentation and manage local and remote systems using WMI via the wmix module for PowerShell.

WMIOps - This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network

  •    PowerShell

WMIOps is a powershell script that uses WMI to perform a variety of actions on hosts, local or remote, within a Windows environment. It's designed primarily for use on penetration tests or red team engagements. This is my first PowerShell script, so I am sure there's things that could have been done better. Please submit a request for anything that could be made more efficient and I'd be happy to look at it, and learn from it :).

Empire - Empire is a PowerShell and Python post-exploitation agent.

  •    PowerShell

Empire is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent. It is the merge of the previous PowerShell Empire and Python EmPyre projects. The framework offers cryptologically-secure communications and a flexible architecture. On the PowerShell side, Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. PowerShell Empire premiered at BSidesLV in 2015 and Python EmPyre premeiered at HackMiami 2016. Empire relies heavily on the work from several other projects for its underlying functionality. We have tried to call out a few of those people we've interacted with heavily here and have included author/reference link information in the source of each Empire module as appropriate. If we have failed to improperly cite existing or prior work, please let us know.


SessionGopher - SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop

  •    PowerShell

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. SessionGopher is a PowerShell tool that finds and decrypts saved session information for remote access tools. It has WMI functionality built in so it can be run remotely. Its best use case is to identify systems that may connect to Unix systems, jump boxes, or point-of-sale terminals.

SessionGopher - SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop

  •    PowerShell

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. SessionGopher is a PowerShell tool that finds and decrypts saved session information for remote access tools. It has WMI functionality built in so it can be run remotely. Its best use case is to identify systems that may connect to Unix systems, jump boxes, or point-of-sale terminals.

Pester - Pester is the ubiquitous test and mock framework for PowerShell.

  •    PowerShell

Pester is the ubiquitous test and mock framework for PowerShell. This code example lies a tiny bit, find it annotated and production ready here.

PoshC2 - Powershell C2 Server and Implants

  •    PowerShell

PoshC2 is a proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement. The tools and modules were developed off the back of our successful PowerShell sessions and payload types for the Metasploit Framework. PowerShell was chosen as the base language as it provides all of the functionality and rich features required without needing to introduce multiple languages to the framework. Requires only Powershell v2 on the client.

Win10-Initial-Setup-Script - PowerShell script for automation of routine tasks done after fresh installations of Windows 10 / Windows Server 2016

  •    PowerShell

This is a PowerShell script for automation of routine tasks done after fresh installations of Windows 10 and Windows Server 2016. This is by no means any complete set of all existing Windows tweaks and neither is it another "antispying" type of script. It's simply a setting which I like to use and which in my opinion make the system less obtrusive. If you just want to run the script with default preset, simply right click on the Win10.ps1 file, choose Run with PowerShell, and confirm execution policy change. Make sure your account is a member of Administrators group as the script attempts to run with elevated privileges.

PowerShell Eventing Libraries for PowerShell 1.0 and 2.0

  •    DotNet

Trap and respond to synchronous & asynchronous .NET, COM and WMI events or Hot Keys within your powershell scripts with this easy to use suite of cmdlets. Compatible with PowerShell 1.0, 2.0 & 3.0

Revoke-Obfuscation - PowerShell Obfuscation Detection Framework

  •    PowerShell

Revoke-Obfuscation is a PowerShell v3.0+ compatible PowerShell obfuscation detection framework. In the Fall of 2016 and Spring of 2017, Daniel Bohannon (@danielhbohannon) released Invoke-Obfuscation and Invoke-CradleCrafter, two open-source PowerShell obfuscation frameworks. The goal of this research and these frameworks was to highlight the limitations of a purely signature-based approach to detecting attackers' usage of PowerShell. The core message to defenders has been to focus on detecting Indicators of Obfuscation in addition to known suspicious syntax.

WinRM - Ruby library for Windows Remote Management

  •    Ruby

This is a SOAP library that uses the functionality in Windows Remote Management(WinRM) to call native object in Windows. This includes, but is not limited to, running batch scripts, powershell scripts and fetching WMI variables. For more information on WinRM, please visit Microsoft's WinRM site. As of version 2.0, this gem retains the WinRM name but all powershell calls use the more modern Powershell Remoting Protocol (PSRP) for initializing runspace pools as well as creating and processing powershell pipelines.

Invoke-TheHash - PowerShell Pass The Hash Utils

  •    PowerShell

Invoke-TheHash contains PowerShell functions for performing pass the hash WMI and SMB tasks. WMI and SMB connections are accessed through the .NET TCPClient. Authentication is performed by passing an NTLM hash into the NTLMv2 authentication protocol. Local administrator privilege is not required client-side.

SQL Server PowerShell Extensions

  •    

The primary goal of SQL Server PowerShell Extensions (SQLPSX) is to provide intuitive functions around the SMO objects which are backward compatible with SQL 2000. A secondary goal is to provide an application which reports flatten/effective security settings.

oh-my-posh - A prompt theming engine for Powershell running in ConEmu

  •    PowerShell

A theme engine for Powershell in ConEmu inspired by the work done by Chris Benti on PS-Config and Oh-My-ZSH on OSX and Linux (hence the name). More information about why I made this can be found on my blog.

PowerEvents for Windows PowerShell

  •    

A Microsoft Windows PowerShell module to assist with managing permanent WMI event consumer registrations. You can use this module to register for, and respond to, system-level events available to WMI.

Posh-Hg

  •    

Mercurial integration for Windows Powershell

PowerShell Ad-Hoc Web Server (paws)

  •    

A web server written entirely in PowerShell. Also the beginning of a framework for developing web applications in PowerShell.