Skip to content
This repository has been archived by the owner on Jan 29, 2020. It is now read-only.

Commit

Permalink
Merge branch 'master' into module_dev_paranoia
Browse files Browse the repository at this point in the history
  • Loading branch information
pasv committed Oct 29, 2015
2 parents 875284b + e62c586 commit d6daa45
Show file tree
Hide file tree
Showing 61 changed files with 9,824 additions and 22,399 deletions.
28 changes: 27 additions & 1 deletion changelog
Original file line number Diff line number Diff line change
@@ -1,3 +1,29 @@
10/26/2015
----------
-Fix for psinject bug due to lack of .NET 4.0 on target.
-Fix for bug in persistence/misc/add_sid_history

10/23/15
-Updated powerview.ps1 source to Version 2.0
-Built a way to dynamically generate the stripped PowerView code for functions needed by PowerView modules (helpers -> generate_dynamic_powershell_script), and updated all relevant PowerView modules
-Renamed PowerView modules to better match PowerView 2.0 naming scheme and moved to situational_awareness/network/powerview/*
-Removed old split-out PowerView source files
-Removed situational_awareness/network/netview
-Combined stealth_userhunter into option for userhunter
-Added situational_awareness/network/get_forest_domain, situational_awareness/network/powerview/get_object_acl, situational_awareness/network/powerview/find_computer_field, situational_awareness/network/powerview/find_user_field, situational_awareness/network/powerview/get_ou, situational_awareness/network/powerview/get_group, situational_awareness/network/powerview/get_group_member, situational_awareness/network/powerview/get_gpo, situational_awareness/network/powerview/find_gpo_location, situational_awareness/network/powerview/find_gpo_computer_admin, situational_awareness/network/powerview/process_hunter, situational_awareness/network/powerview/find_foreign_group, situational_awareness/network/powerview/find_foreign_user
-renamed collection/filesearch to collection/find_interesting_file


9/21/2015
---------
-Fix for 'skywalker' file overwrite exploit on control server (thanks @zeroSteiner!)

9/12/2015
---------
-Added credentials/mimikatz/mimitokens to take advantage of Mimikatz' token listing/elevation
-Added management/enable_multi_rdp to patch terminal services to allow mutiple connections
-Fixed bug in write_dllhijacker that prevented the dll from being written out

============
8/30/2015 - RELEASE 1.2
============
Expand Down Expand Up @@ -88,4 +114,4 @@
8/6/2015
-----------
-Initial release. All components released
-Commited path fix to correct bug in certain modules
-Commited path fix to correct bug in certain modules
Binary file modified data/misc/ReflectivePick_x64_orig.dll
Binary file not shown.
Binary file modified data/misc/ReflectivePick_x86_orig.dll
Binary file not shown.
Loading

0 comments on commit d6daa45

Please sign in to comment.