{"id":4250,"date":"2017-01-14T06:08:12","date_gmt":"2017-01-13T22:08:12","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4250"},"modified":"2017-10-29T20:20:30","modified_gmt":"2017-10-29T12:20:30","slug":"p0wnedshell-powershell-runspace-post-exploitation-toolkit","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/01\/p0wnedshell-powershell-runspace-post-exploitation-toolkit\/","title":{"rendered":"p0wnedShell – PowerShell Runspace Post Exploitation Toolkit"},"content":{"rendered":"

p0wnedShell is an offensive PowerShell Runspace Post Exploitation host application written in C# that does not rely on powershell.exe but runs PowerShell commands and functions within a PowerShell run space environment (.NET). It has a lot of offensive PowerShell modules and binaries included making the process of Post Exploitation easier.<\/p>\n

\"p0wnedShell<\/p>\n

What the author tried was to build an \u201call in one\u201d Post Exploitation tool which could be used to bypass all mitigations solutions (or at least some of), and that has all relevant tooling included. You can use it to perform modern attacks within Active Directory environments and create awareness within your Blue team so they can build the right defence strategies.<\/p>\n

Features\/Modules<\/h3>\n

The following PowerShell tools\/functions are included:<\/p>\n