PowerOPS v1.0(beta) - Powershell for Offensive Operations.

PowerOPS v1.0(beta) – Powershell for Offensive Operations.

Changelog v1.0-beta:
* Add mimikittenz
* Add SMBAutoBrute
* Add PowerUpSQL

PowerOPS v1.0-Beta

PowerOPS v1.0-Beta

PowerOPS is an application written in C# that does not rely on powershell.exe but runs PowerShell commands and functions within a powershell runspace environment (.NET). It intends to include multiple offensive PowerShell modules to make the process of Post Exploitation easier.

It tries to follow the KISS principle, being as simple as possible. The main goal is to make it easy to use PowerShell offensively and help to evade antivirus and other mitigations solutions. It does this by:
1. Doesn’t rely on powershell.exe, it calls PowerShell directly through the .NET framework, which might help bypassing security controls like GPO, SRP, App Locker.
2. The payloads are executed from memory and never touch disk, evading most antivirus engines.

PowerOPS - Powershell for Offensive Operations

PowerOPS – Powershell for Offensive Operations

PowerOPS was inspired by Cn33liz/p0wnedShell. However I was only interested in PowerShell modules and I was looking for more flexibility. Since PowerOPS offers basically an interactive PowerShell command prompt you are free to use the PowerShell tools included the way you want, and additionally execute any valid PowerShell command.

The following PowerShell tools/functions are included:
+ PowerShellMafia/Powersploit
— Get-Keystrokes
— Invoke-DllInjection
— Invoke-Mimikatz
— Invoke-NinjaCopy
— Invoke-Shellcode
— Invoke-ReflectivePEInjection
— Invoke-TokenManipulation
— Invoke-WMICommand
— PowerUp
— PowerView
+ Nishang
— Get-Information
— Get-PassHashes
— Port-Scan
+ Auto-GPPPassword
+ PowerCat
+ Empire
— Invoke-Psexec
— Invoke-SSHComman
Additionally you can run any valid PowerShell command.
Powershell functions within the Runspace are loaded in memory from Base64 Encoded Strings.

Download: v1.0-beta.zip | Our Post Before
Source: https://github.com/fdiskyou