Skip to content
This repository was archived by the owner on Jan 21, 2021. It is now read-only.

Commit c2a7092

Browse files
author
Matt Graeber
committed
Removed all version numbers from scripts
Scripts in a module should not be individually versioned. Only the module should be versioned.
1 parent b01a812 commit c2a7092

11 files changed

+5
-77
lines changed

AntivirusBypass/AntivirusBypass.psd1

-44
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
@{
2-
32
# Script module or binary module file associated with this manifest.
43
ModuleToProcess = 'AntivirusBypass.psm1'
54

@@ -24,39 +23,6 @@ Description = 'PowerSploit Antivirus Avoidance/Bypass Module'
2423
# Minimum version of the Windows PowerShell engine required by this module
2524
PowerShellVersion = '2.0'
2625

27-
# Name of the Windows PowerShell host required by this module
28-
# PowerShellHostName = ''
29-
30-
# Minimum version of the Windows PowerShell host required by this module
31-
# PowerShellHostVersion = ''
32-
33-
# Minimum version of the .NET Framework required by this module
34-
# DotNetFrameworkVersion = ''
35-
36-
# Minimum version of the common language runtime (CLR) required by this module
37-
# CLRVersion = ''
38-
39-
# Processor architecture (None, X86, Amd64) required by this module
40-
# ProcessorArchitecture = ''
41-
42-
# Modules that must be imported into the global environment prior to importing this module
43-
# RequiredModules = @()
44-
45-
# Assemblies that must be loaded prior to importing this module
46-
# RequiredAssemblies = @()
47-
48-
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
49-
# ScriptsToProcess = ''
50-
51-
# Type files (.ps1xml) to be loaded when importing this module
52-
# TypesToProcess = @()
53-
54-
# Format files (.ps1xml) to be loaded when importing this module
55-
# FormatsToProcess = @()
56-
57-
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
58-
# NestedModules = @()
59-
6026
# Functions to export from this module
6127
FunctionsToExport = '*'
6228

@@ -74,14 +40,4 @@ ModuleList = @(@{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUID
7440

7541
# List of all files packaged with this module
7642
FileList = 'AntivirusBypass.psm1', 'AntivirusBypass.psd1', 'Find-AVSignature.ps1', 'Usage.md'
77-
78-
# Private data to pass to the module specified in RootModule/ModuleToProcess
79-
# PrivateData = ''
80-
81-
# HelpInfo URI of this module
82-
# HelpInfoURI = ''
83-
84-
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
85-
# DefaultCommandPrefix = ''
86-
8743
}

CodeExecution/Invoke-ReflectivePEInjection.ps1

+1-4
Original file line numberDiff line numberDiff line change
@@ -153,13 +153,10 @@ Find a DemoDLL at: https://github.com/clymb3r/PowerShell/tree/master/Invoke-Refl
153153
154154
.LINK
155155
156-
Blog: http://clymb3r.wordpress.com/
157-
Github repo: https://github.com/clymb3r/PowerShell/tree/master/Invoke-ReflectivePEInjection
156+
http://clymb3r.wordpress.com/2013/04/06/reflective-dll-injection-with-powershell/
158157
159-
Blog on reflective loading: http://clymb3r.wordpress.com/2013/04/06/reflective-dll-injection-with-powershell/
160158
Blog on modifying mimikatz for reflective loading: http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/
161159
Blog on using this script as a backdoor with SQL server: http://www.casaba.com/blog/
162-
163160
#>
164161

165162
[CmdletBinding()]

CodeExecution/Invoke-WmiCommand.ps1

-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
#Requires -Version 2
2-
31
function Invoke-WmiCommand {
42
<#
53
.SYNOPSIS

Exfiltration/Get-GPPPassword.ps1

-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ function Get-GPPPassword {
99
License: BSD 3-Clause
1010
Required Dependencies: None
1111
Optional Dependencies: None
12-
Version: 2.4.2
1312
1413
.DESCRIPTION
1514

Exfiltration/Invoke-CredentialInjection.ps1

-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ function Invoke-CredentialInjection
1313
License: BSD 3-Clause
1414
Required Dependencies: None
1515
Optional Dependencies: None
16-
Version: 1.1
1716
1817
.DESCRIPTION
1918

Exfiltration/Invoke-Mimikatz.ps1

+2-12
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,7 @@ Mimikatz Author: Benjamin DELPY `gentilkiwi`. Blog: http://blog.gentilkiwi.com.
1515
License: http://creativecommons.org/licenses/by/3.0/fr/
1616
Required Dependencies: Mimikatz (included)
1717
Optional Dependencies: None
18-
Version: 1.5
19-
ReflectivePEInjection version: 1.1
20-
Mimikatz version: 2.0 alpha (2/16/2015)
18+
Mimikatz version: 2.0 alpha (12/14/2015)
2119

2220
.DESCRIPTION
2321

@@ -62,15 +60,7 @@ Find mimikatz at: http://blog.gentilkiwi.com
6260

6361
.LINK
6462

65-
Blog: http://clymb3r.wordpress.com/
66-
Benjamin DELPY blog: http://blog.gentilkiwi.com
67-
68-
Github repo: https://github.com/clymb3r/PowerShell
69-
mimikatz Github repo: https://github.com/gentilkiwi/mimikatz
70-
71-
Blog on reflective loading: http://clymb3r.wordpress.com/2013/04/06/reflective-dll-injection-with-powershell/
72-
Blog on modifying mimikatz for reflective loading: http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/
73-
63+
http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/
7464
#>
7565

7666
[CmdletBinding(DefaultParameterSetName="DumpCreds")]

Exfiltration/Invoke-NinjaCopy.ps1

-2
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@ Contributors: This script has a byte array hardcoded, which contains a DLL wich
2525
License: GPLv3 or later
2626
Required Dependencies: None
2727
Optional Dependencies: None
28-
Version: 1.1
29-
ReflectivePEInjection version: 1.1
3028
3129
.DESCRIPTION
3230

Exfiltration/Invoke-TokenManipulation.ps1

-2
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,6 @@ Author: Joe Bialek, Twitter: @JosephBialek
4949
License: BSD 3-Clause
5050
Required Dependencies: None
5151
Optional Dependencies: None
52-
Version: 1.12
53-
(1.11 -> 1.12: Simple logic added by Josh M. Bryant to find an unprotected process to grab a SYSTEM token from, rather than hardcoding to wininit, https://www.fixtheexchange.com/)
5452
5553
.DESCRIPTION
5654

Exfiltration/VolumeShadowCopyTools.ps1

-4
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ function Get-VolumeShadowCopy
1010
License: BSD 3-Clause
1111
Required Dependencies: None
1212
Optional Dependencies: None
13-
Version: 2.0.0
1413
#>
1514

1615
$UserIdentity = ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent())
@@ -35,7 +34,6 @@ function New-VolumeShadowCopy
3534
License: BSD 3-Clause
3635
Required Dependencies: None
3736
Optional Dependencies: None
38-
Version: 2.0.0
3937
4038
.DESCRIPTION
4139
@@ -121,7 +119,6 @@ function Remove-VolumeShadowCopy
121119
License: BSD 3-Clause
122120
Required Dependencies: None
123121
Optional Dependencies: None
124-
Version: 2.0.0
125122
126123
.DESCRIPTION
127124
@@ -180,7 +177,6 @@ function Mount-VolumeShadowCopy
180177
License: BSD 3-Clause
181178
Required Dependencies: None
182179
Optional Dependencies: None
183-
Version: 2.0.0
184180
185181
.DESCRIPTION
186182

PowerSploit.psd1

+2-1
Original file line numberDiff line numberDiff line change
@@ -41,5 +41,6 @@ ModuleList = @( @{ModuleName = 'AntivirusBypass'; ModuleVersion = '1.0.0.0'; GUI
4141
@{ModuleName = 'Exfiltration'; ModuleVersion = '1.0.0.0'; GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a'},
4242
@{ModuleName = 'Recon'; ModuleVersion = '1.0.0.0'; GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'},
4343
@{ModuleName = 'ScriptModification'; ModuleVersion = '1.0.0.0'; GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'},
44-
@{ModuleName = 'Persistence'; ModuleVersion = '1.0.0.0'; GUID = '633d0f10-a056-41da-869d-6d2f75430195'} )
44+
@{ModuleName = 'Persistence'; ModuleVersion = '1.0.0.0'; GUID = '633d0f10-a056-41da-869d-6d2f75430195'},
45+
@{ModuleName = 'PrivEsc'; ModuleVersion = '1.0.0.0'; GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'} )
4546
}

Recon/Invoke-Portscan.ps1

-4
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,6 @@ Optional Dependencies: None
1515
1616
Does a simple port scan using regular sockets, based (pretty) loosely on nmap
1717
18-
.NOTES
19-
20-
version .13
21-
2218
.PARAMETER Hosts
2319
2420
Include these comma seperated hosts (supports IPv4 CIDR notation) or pipe them in

0 commit comments

Comments
 (0)