Skip to content

Commit 869fc11

Browse files
SecureThisShitSecureThisShit
SecureThisShit
authored and
SecureThisShit
committed
Offline Version Update
1 parent b1a094a commit 869fc11

File tree

7 files changed

+712
-307
lines changed

7 files changed

+712
-307
lines changed

.gitmodules

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +0,0 @@
1-
[submodule "p0wnedShell"]
2-
path = p0wnedShell
3-
url = https://github.com/SecureThisShit/p0wnedShell.git

Offline_WinPwn.ps1

Lines changed: 709 additions & 295 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ If you find yourself stuck on a windows system with no internet access - no prob
1818

1919
Functions available after Import:
2020
* #### `WinPwn` -> Menu to choose attacks:
21-
![alt text](https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/master/WinPwn.jpg)
21+
![alt text](https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/master/images/WinPwn.jpg)
2222
* #### `Inveigh` -> Executes Inveigh in a new Console window , SMB-Relay attacks with Session management (Invoke-TheHash) integrated
2323
* #### `sessionGopher` -> Executes Sessiongopher Asking you for parameters
2424
* #### `kittielocal` ->
@@ -61,15 +61,10 @@ Functions available after Import:
6161
* #### `Sharpcradle` -> Load C# Files from a remote Webserver to RAM
6262
* #### `DomainPassSpray` -> DomainPasswordSpray Attacks, one password for all domain users
6363

64-
The submodule is a forked and edited version of https://github.com/Cn33liz/p0wnedShell. You can compile it yourself and use it for powershell restriction bypass and AMSI-Bypass. Most AV-Solutions can be evaded this way. Just run the executable File, choose 17. and execute WinPwn.
65-
66-
![alt text](https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/master/p0wnedmenu.PNG)
67-
68-
![alt text](https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/master/p0wned.png)
6964

7065
## TO-DO
7166
- [x] Some obfuskation
72-
- [ ] More obfuscation
67+
- [x] More obfuscation
7368
- [ ] Proxy via PAC-File support
7469
- [x] Get the scripts from my own creds repository (https://github.com/S3cur3Th1sSh1t/Creds) to be independent from changes in the original repositories
7570
- [ ] More Recon/Exploitation functions
@@ -78,7 +73,6 @@ The submodule is a forked and edited version of https://github.com/Cn33liz/p0wne
7873
- [x] Amsi Bypass
7974
- [ ] Mailsniper integration
8075
- [ ] Azure Checks / Modules integration
81-
- [ ] LAPS Toolkit integration
8276

8377
## CREDITS
8478

@@ -100,6 +94,7 @@ The submodule is a forked and edited version of https://github.com/Cn33liz/p0wne
10094
- [X] [rasta-mouse](https://github.com/rasta-mouse/) - AmsiScanBufferBypass
10195
- [X] [l0ss](https://github.com/l0ss/) - Grouper2
10296
- [X] [dafthack](https://github.com/dafthack/) - DomainPasswordSpray
97+
- [X] [enjoiz](https://github.com/enjoiz/Privesc) - PrivEsc
10398

10499
## Legal disclaimer:
105100
Usage of WinPwn for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.

images/WinPwn.jpg

53.9 KB
Loading

p0wned.png

-56.3 KB
Binary file not shown.

p0wnedShell

Lines changed: 0 additions & 1 deletion
This file was deleted.

p0wnedmenu.PNG

-6.32 KB
Binary file not shown.

0 commit comments

Comments
 (0)