BloodHound, Csharp, Default Credentials, Downloads, Hacking Tools, mimikatz, NTLM Hashes, Post-Exploitation, PowerSharpPack, PowerShell, PowerUp, Privilege Escalation, SharpSploit, Windows, Windows Privilege Escalation

PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage

Many usefull offensive CSharp Projects wraped into Powershell for easy usage.
Why? In my personal opinion offensive Powershell is not dead because of AMSI, Script-block-logging, Constrained Language Mode or other protection features. Any of these mechanisms can be bypassed. Since most new innovative offensive security projects are written in C# I decided to make them usable in powershell as well.
So what did i basically do here?

  1. First of all clone each C# Repo.
  2. Set the class and main methods public
  3. For some projects i merged pull requests with new features or bug fixes or i had to remove environment.exit statements so that the whole powershell process is not killed for missing parameters and so on
  4. Afterwards compiling each binary
  5. Encode the compiled binary base64 and load it in powershell via [System.Reflection.Assembly]::Load([Convert]::FromBase64String()).

Its a very easy but for many repos time consuming process.
Which tools are included?
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS @Credit to:
Seatbelt is a C# project that performs a number of security oriented host-survey “safety checks” relevant from both offensive and defensive security perspectives. @Credit to:
.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge. @Credit to:
Creates a local RW section in UrbanBishop and then maps that section as RX into a remote process. Shellcode loading made easy. @Credit to:
SharpUp is a C# port of various PowerUp functionality. @Credit to:
Rubeus is a C# toolset for raw Kerberos interaction and abuses. @Credit to: &&
Windows persistence toolkit written in C#. @Credit to:
C# implementation of harmj0y’s PowerView @Credit to:
Check the Local Windows Privilege Escalation checklist from @Credit to:
Lockless allows for the copying of locked files. @Credit to:
.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins. @Credit to:
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality. @Credit to: &&
Enumerate all network shares in the current domain. Also, can resolve names to IP addresses. @Credit to:
Find specific users in active directory via their username and logon IP address @Credit to:
SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt Strike. @Credit to:
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities @Credit to:
Find vulnerabilities in AD Group Policy @Credit to:
A tool to elevate privilege with Windows Tokens @Credit to:
Search tool to find specific files containing specific words, i.e. files containing passwords. @Credit to:
Just load the main script with
iex(new-object net.webclient).downloadstring('')
and choose the tool as switch parameter for example:
PowerSharpPack -Seatbelt -Command "all"

If you want to pass multiple parameters to the binary you can just use quotation marks like:
PowerSharpPack -Rubeus -Command "kerberoast /outfile:Roasted.txt"
If you dont want to load all binaries for reasons you can use the per binary Powershell scripts located in the PowerSharpBinaries folder.
Projects which are also available as standalone powershell script:
Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute. @Credit to:
SSDP Service Discovery @Credit to:
DAFT: Database Audit Framework & Toolkit @Credit to:
Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments @Credit to:
A C# tool for enumerating remote access policies through group policy. @Credit to:
Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity) @Credit to:
.NET 4.0 Project to interact with video, audio and keyboard hardware. @Credit to:
C# Clipboard Monitor @Credit to:
Discover Printers + check for vulns @Credit to:
Tool to create hidden registry keys. @Credit to:
PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well. @Credit to:
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user’s edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO. @Credit to:
SharpDump is a C# port of PowerSploit’s Out-Minidump.ps1 functionality. @Credit to:
C# Data Collector for the BloodHound Project, Version 3 @Credit to:
SharpLocker helps get current user credentials by popping a fake Windows lock screen, all output is sent to Console which works perfect for Cobalt Strike. @Credit to:
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. @Credit to:
Fake Windows logon screen to steal passwords @Credit to:
PowerShell Runspace Post Exploitation Toolkit @Credit to:
SafetyKatz is a combination of slightly modified version of @gentilkiwi’s Mimikatz project and @subTee’s .NET PE Loader I modified this one again with my own obfuscated Mimikatz Version. @Credit to:
Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 spoofer/man-in-the-middle tool . @Credit to:
SharpSploit is a .NET post-exploitation library written in C#. @Credit to:
A tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax ). @Credit to:
itm4ns Printspoofer in C#. @Credit to:
Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into memory. @Credit to:

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend