PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.
====================================================================================
Empire: PowerShell post-exploitation agent | [Version]: 2.0 Mod: HackPlayers
====================================================================================
[Web]: https://www.PowerShellEmpire.com/ | [Twitter]: @harmj0y, @sixdub, @enigma0x3
====================================================================================
__ __ ___ ______ __ ___
| | | | / \ / || |/ /
| |__| | / ^ \ | ,----'| ' /
| __ | / /_\ \ | | | <
| | | | / _____ \ | `----.| . \
|__| |__| /__/ \__\ \______||__|\__\
_______ .___ ___. .______ __ .______ _______
| ____|| \/ | | _ \ | | | _ \ | ____|
| |__ | \ / | | |_) | | | | |_) | | |__
| __| | |\/| | | ___/ | | | / | __|
| |____ | | | | | | | | | |\ \----.| |____
|_______||__| |__| | _| |__| | _| `._____||_______| Mod: HackPlayers
283 modules currently loaded
0 listeners currently active
0 agents currently active
(Empire) >
BypassUAC-Fodhelper.ps1 (BypassUAC using fodhelper working in Windows 10)
BypassUAC-HackPlayers-eventvwr.ps1 (BypassUAC using eventvwr working in Windows 7/8/10)
Invoke-Mimikittenz (Using Windows function ReadProcessMemory() in order to extract plain-text passwords)
Keylogger_selective (Executes a keylogger selectively)
PsBoTelegram (Backdoor controlled from telegram)
Execute-Url-Script (Run scripts from a file in a url)
Sherlock (Find privilege escalation vulnerabilities)
MS16-135 (Exploit privilege escalation MS16-135 x64 by b33f FuzzySecurity)
Invoke-HostRecon (Situational Awareness)
Binder-4System (Get System from service process)
Invoke-Phant0m (Stops threads from the svhost process to prevent it from logging events without stopping the service.)
Set-WindowsDefender (We can disabled and enabled Windows Defender silently)
DoublePulsar (DoublePulsar inject an aribitrary DLL in other process)
Get-ShellContent (This script leverages modified strings2 to extract the input and output of any commandline process)
Invoke-VNC (This module loads a VNC server into RAM.)
Powercat (Netcat: The powershell version.)
Invoke-WCMDump (Credentials are only returned for the current user.)
StarFighters JS
StarFighters VBS
StarFighters JS SCT
ASPX
git clone https://github.com/hackplayers/Empire-mod-Hpys-tests.git
cd empire-mod-hackplayers/setup/
sudo apt-get update > /dev/null
./install.sh
cd ..
./empire