{"id":4249,"date":"2016-10-18T03:07:54","date_gmt":"2016-10-17T19:07:54","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4249"},"modified":"2016-10-18T03:08:05","modified_gmt":"2016-10-17T19:08:05","slug":"nishang-powershell-for-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/10\/nishang-powershell-for-penetration-testing\/","title":{"rendered":"nishang – PowerShell For Penetration Testing"},"content":{"rendered":"

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for penetration testing, offensive security and red teaming. Nishang is useful during all phases of penetration testing.<\/p>\n

\"nishang<\/p>\n

Usage<\/h3>\n

Import all the scripts in the current PowerShell session (PowerShell v3 onwards).<\/p>\n

PS C:\\nishang> Import-Module .\\nishang.psm1<\/pre>\n

Use the individual scripts with dot sourcing.<\/p>\n

PS C:\\nishang> . C:\\nishang\\Gather\\Get-Information.ps1\r\n\r\nPS C:\\nishang> Get-Information<\/pre>\n

To get help about any script or function, use:<\/p>\n

PS C:\\nishang> Get-Help [scriptname] -full<\/pre>\n

Note that the help is available for the function loaded after running the script and not the script itself since version 0.3.8. In all cases, the function name is same as the script name.<\/p>\n