cMsmq - The cMsmq DSC resource module.

  •        25

The cMsmq module contains DSC resources for managing private MSMQ queues. Supports Windows Server 2008 R2 and later.

https://github.com/SNikalaichyk/cMsmq

Tags
Implementation
License
Platform

   




Related Projects

DscResources - Central repository for PowerShell Desired State Configuration (DSC) resources.

  •    PowerShell

This is the central repository for the DSC Resource Kit, a collection of DSC resources maintained and released by Microsoft. A dashboard of all open issues and pull requests across DSC Resource Kit is available on the DSC Resource Kit Waffle board.

PowerShellGet - PowerShellGet is the Package Manager for PowerShell

  •    PowerShell

PowerShellGet is a PowerShell module with commands for discovering, installing, updating and publishing the PowerShell artifacts like Modules, DSC Resources, Role Capabilities and Scripts. PowerShellGet module is also integrated with the PackageManagement module as a provider, users can also use the PackageManagement cmdlets for discovering, installing and updating the PowerShell artifacts like Modules and Scripts.

Plaster - Plaster is a template-based file and project generator written in PowerShell.

  •    PowerShell

Plaster is a template-based file and project generator written in PowerShell. Its purpose is to streamline the creation of PowerShell module projects, Pester tests, DSC configurations, and more. File generation is performed using crafted templates which allow the user to fill in details and choose from options to get their desired output. You can think of Plaster as Yeoman for the PowerShell community.

awesome-powershell - A curated list of delightful PowerShell modules and resources

  •    

A curated list of delightful PowerShell packages and resources. PowerShell is a cross-platform (Windows, Linux, and macOS) automation and configuration tool that is optimized for dealing with structured data (e.g. JSON, CSV, XML, etc.), REST APIs, and object models. It includes a command-line shell and an associated scripting language.

Empire - Empire is a PowerShell and Python post-exploitation agent.

  •    PowerShell

Empire is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent. It is the merge of the previous PowerShell Empire and Python EmPyre projects. The framework offers cryptologically-secure communications and a flexible architecture. On the PowerShell side, Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. PowerShell Empire premiered at BSidesLV in 2015 and Python EmPyre premeiered at HackMiami 2016. Empire relies heavily on the work from several other projects for its underlying functionality. We have tried to call out a few of those people we've interacted with heavily here and have included author/reference link information in the source of each Empire module as appropriate. If we have failed to improperly cite existing or prior work, please let us know.


PoshC2 - Powershell C2 Server and Implants

  •    PowerShell

PoshC2 is a proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement. The tools and modules were developed off the back of our successful PowerShell sessions and payload types for the Metasploit Framework. PowerShell was chosen as the base language as it provides all of the functionality and rich features required without needing to introduce multiple languages to the framework. Requires only Powershell v2 on the client.

PowerShell-Suite - My musings with PowerShell

  •    PowerShell

There are great tools and resources online to accomplish most any task in PowerShell, sometimes however, there is a need to script together a util for a specific purpose or to bridge an ontological gap. This is a collection of PowerShell utilities I put together either for fun or because I had a narrow application in mind. Functionally equivalent to Windows "runas.exe", using Advapi32::CreateProcessWithLogonW.

Visual Studio 2010 PowerShell Code Generator

  •    CSharp

Brings rich PowerShell functionalities into VS Templating. You can access the file system, the registry, and many other PowerShell features. You can also run PowerShell cmdlets, import modules and more.

PSScriptAnalyzer - Download ScriptAnalyzer from PowerShellGallery

  •    CSharp

PSScriptAnalyzer is a static code checker for Windows PowerShell modules and scripts. PSScriptAnalyzer checks the quality of Windows PowerShell code by running a set of rules. The rules are based on PowerShell best practices identified by PowerShell Team and the community. It generates DiagnosticResults (errors and warnings) to inform users about potential code defects and suggests possible solutions for improvements. PSScriptAnalyzer is shipped with a collection of built-in rules that checks various aspects of PowerShell code such as presence of uninitialized variables, usage of PSCredential Type, usage of Invoke-Expression etc. Additional functionalities such as exclude/include specific rules are also supported.

p0wnedShell - PowerShell Runspace Post Exploitation Toolkit

  •    CSharp

p0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and functions within a powershell runspace environment (.NET). It has a lot of offensive PowerShell modules and binaries included to make the process of Post Exploitation easier. What we tried was to build an “all in one” Post Exploitation tool which we could use to bypass all mitigations solutions (or at least some off), and that has all relevant tooling included. You can use it to perform modern attacks within Active Directory environments and create awareness within your Blue team so they can build the right defense strategies. With AutoMasq set to false, you just run the executable so it runs normally. With AutoMasq enabled, you could rename the p0wnedShell executable as the process you're going to masquerade (masqBinary), so it has the appearance of that process (for example notepad.exe).

Windows PowerShell Snap-In for EC2

  •    

The purpose of this project is to create and maintain a PowerShell Snap-In that allows consumers of Amazon's EC2 service to manage their computing resources via PowerShell.

Web based PowerShell Console

  •    

The "Web based PowerShell Console" enables you to execute PowerShell Scripts and Cmdlets via a Web or Browser based PowerShell Console. Just install the tool on a mchine running IIS and use PowerShell via network!

PowerShell-Docs - The official PowerShell documentation sources

  •    PowerShell

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments. Welcome to the PowerShell-Docs repository, housing the official PowerShell documentation.

PSAttack - A portable console aimed at making pentesting with PowerShell a little easier.

  •    CSharp

A portable console aimed at making pentesting with PowerShell a little easier. PS>Attack combines some of the best projects in the infosec powershell community into a self contained custom PowerShell console. It's designed to make it easy to use PowerShell offensively and to evade antivirus and Incident Response teams. It does this with in a couple of ways.

Random-PowerShell-Work - Random PowerShell Work

  •    PowerShell

If you get some use out of my scripts, drop me a few bucks. This is a conglomeration of PowerShell scripts that I've written over the years. If you'd like more PowerShell awesomeness check out my blog at Adam, the Automator. This is where I write about automation, lots of PowerShell and post regularly about time-saving tricks with PowerShell.

PolyMon

  •    

PolyMon is a .NET/SQL Server based system to monitor, analyze and alert on a variety of network resources including PowerShell, PerfMon, WMI, SNMP, TCP, URL, etc. Integrates with PowerShell for custom monitors and Actions. Also easily extensible through a plug-in architecture.

Windows PowerShell Snap-In for GoGrid

  •    

The purpose of this project is to create and maintain a PowerShell Snap-In that allows consumers of the GoGrid service to manage their computing resources via PowerShell.

PowerShell Management Library for TEM

  •    

A project to provide a PowerShell functionality for managing your Tivoli Endpoint Manager (built upon BigFix technology). You can locally or remotely manage endpoints and relays via these simple and easy to use PowerShell Module.

unicorn - Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory

  •    Python

Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed if using Metasploit methods and in the right path) and magic unicorn will automatically generate a powershell command that you need to simply cut and paste the powershell code into a command line window or through a payload delivery system. Unicorn supports your own shellcode, cobalt strike, and Metasploit.

Revoke-Obfuscation - PowerShell Obfuscation Detection Framework

  •    PowerShell

Revoke-Obfuscation is a PowerShell v3.0+ compatible PowerShell obfuscation detection framework. In the Fall of 2016 and Spring of 2017, Daniel Bohannon (@danielhbohannon) released Invoke-Obfuscation and Invoke-CradleCrafter, two open-source PowerShell obfuscation frameworks. The goal of this research and these frameworks was to highlight the limitations of a purely signature-based approach to detecting attackers' usage of PowerShell. The core message to defenders has been to focus on detecting Indicators of Obfuscation in addition to known suspicious syntax.