{"id":4249,"date":"2016-10-18T03:07:54","date_gmt":"2016-10-17T19:07:54","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4249"},"modified":"2016-10-18T03:08:05","modified_gmt":"2016-10-17T19:08:05","slug":"nishang-powershell-for-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/10\/nishang-powershell-for-penetration-testing\/","title":{"rendered":"nishang – PowerShell For Penetration Testing"},"content":{"rendered":"
Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for penetration testing, offensive security and red teaming. Nishang is useful during all phases of penetration testing.<\/p>\n
<\/p>\n
Import all the scripts in the current PowerShell session (PowerShell v3 onwards).<\/p>\n
PS C:\\nishang> Import-Module .\\nishang.psm1<\/pre>\nUse the individual scripts with dot sourcing.<\/p>\n
PS C:\\nishang> . C:\\nishang\\Gather\\Get-Information.ps1\r\n\r\nPS C:\\nishang> Get-Information<\/pre>\nTo get help about any script or function, use:<\/p>\n
PS C:\\nishang> Get-Help [scriptname] -full<\/pre>\nNote that the help is available for the function loaded after running the script and not the script itself since version 0.3.8. In all cases, the function name is same as the script name.<\/p>\n