{"id":4247,"date":"2016-08-20T15:53:59","date_gmt":"2016-08-20T07:53:59","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4247"},"modified":"2017-10-29T20:20:01","modified_gmt":"2017-10-29T12:20:01","slug":"powerops-powershell-runspace-portable-post-exploitation-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/08\/powerops-powershell-runspace-portable-post-exploitation-tool\/","title":{"rendered":"PowerOPS – PowerShell Runspace Portable Post Exploitation Tool"},"content":{"rendered":"
PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”. PowerOPS is an application written in C# that does not rely on powershell.exe but runs PowerShell commands and functions within a powershell runspace environment (.NET). It intends to include multiple offensive PowerShell modules to make the process of Post Exploitation easier.<\/p>\n
<\/p>\n
It tries to follow the KISS principle, being as simple as possible. The main goal is to make it easy to use PowerShell offensively and help to evade antivirus and other mitigations solutions. It does this by:<\/p>\n
Since PowerOPS offers basically an interactive PowerShell command prompt you are free to use the PowerShell tools included the way you want, and additionally execute any valid PowerShell command.<\/p>\n