-
Notifications
You must be signed in to change notification settings - Fork 92
/
CHANGELOG.txt
43 lines (38 loc) · 4.99 KB
/
CHANGELOG.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
*******************************************************************************************************
# CHANGE LOG FOR REDTEAMENUM MODULE #
*******************************************************************************************************
Module Version 1.2
- Updated Help to fit typical PS cmdlet standards
- Added 3 cmdlets from my ReversePowerShell module to this module as they are red team tools as well.
- Added initial creation of the Test-SQLCredential cmdlet to the module manifest.
- Added initial creation of the Test-FTPCredential cmdlet to the module manifest.
- Added initial creation of the Test-BruteLocalUserCredential cmdlet to the module manifest.
- Added initial creation of the Enable-RDP cmdlet to the module manifest.
- Added initial creation of the Invoke-DccwUACBypass cmdlet to the module manifest.
- Added initial creation of the Test-KerberosDoubleHop cmdlet to the module manifest.
- Added initial creation of the Invoke-AzurePasswordSpray cmdlet to the module manifest.
- Added initial creation of the Get-ClearTextPassword cmdlet to the module manifest.
- Added initial creation of the Test-BruteForceZip cmdlet to the module manifest.
- Added initial creation of the Test-BruteForceCredentials to the module manifest.
- Added initial creation of the Get-NetworkShareInfo to the module manifest.
- Added initial creation of the Invoke-AzureEnum to the module manifest.
- Added initial creation of the Convert-StringToHash to the module manifest
Module Version 1.1
- Added initial creation of the Invoke-UnquotedServicePathExploit cmdlet to the module manifest.
- Added initial creation of the Invoke-FodHelperBypass cmdlet to the module manifest.
- Added initial creation of the Invoke-InMemoryPayload cmdlet to the module manifest.
- Added initial creation of the Invoke-UseCreds cmdlet to the module manifest.
Module Version 1.0
- Added initial creation of the Test-PrivEsc module to the manifest.
- Added initial creation of the Get-InitialEnum cmdlet to the module manifest.
- Added initial creation of the Convert-Base64 cmdlet to the module manifest.
- Added initial creation of the Convert-SID cmdlet to the module manifest.
- Added initial creation of the Get-LdapInfo cmdlet to the module manifest.
- Added initial creation of the Invoke-PortScan cmdlet to the module manifest.
- Added initial creation of the Invoke-PingSweep cmdlet to the module manifest.
- Added initial creation of the Start-HTTPServer cmdlet to the module manifest.
#--------------------------------------------------------------------------------------------------------
#----------------------------------------------------------------------
# Command for updating Module Manifest
#
# New-ModuleManifest -Path .\RedTeamEnum.psd1 -Author 'Robert H. Osborne' -CompanyName 'OsbornePro' -RootModule .\RedTeamEnum.psm1 -ModuleVersion 1.2 -Description 'Collection of tools Red Teamers may use during a penetration test.' -CmdletsToExport 'Convert-Base64', 'Get-LdapInfo', 'Invoke-PingSweep', 'Invoke-PortScan','Start-SimpleHTTPServer', 'Test-PrivEsc', 'Get-InitialEnum', 'Get-AntiVirusProduct', 'Invoke-FodHelperBypass', 'Invoke-InMemoryPayload', 'Invoke-UseCreds', 'Invoke-UnquotedServicePathExploit','Convert-SID','Test-BruteForceCredentials','Test-BruteForceZip','Get-NetworkShareInfo','Get-ClearTextPassword','Start-Listener','Start-Bind','Invoke-AzureEnum','Invoke-ReversePowerShell','Invoke-AzurePasswordSpray','Test-KerberosDoubleHop','Invoke-DccwPersistence','Enable-RDP','Test-BruteLocalUserCredential','Test-FTPCredential','Test-SQLCredential','Convert-StringToHash' -FunctionsToExport 'Convert-Base64', 'Get-LdapInfo', 'Invoke-PingSweep', 'Invoke-PortScan','Start-SimpleHTTPServer', 'Test-PrivEsc', 'Get-InitialEnum', 'Get-AntiVirusProduct', 'Invoke-FodHelperBypass', 'Invoke-InMemoryPayload', 'Invoke-UseCreds', 'Invoke-AzureEnum', 'Invoke-UnquotedServicePathExploit','Convert-SID','Test-BruteForceCredentials','Test-BruteForceZip','Get-NetworkShareInfo','Get-ClearTextPassword','Start-Listener','Start-Bind','Invoke-ReversePowerShell','Invoke-AzurePasswordSpray','Test-KerberosDoubleHop','Invoke-DccwPersistence','Enable-RDP','Test-BruteLocalUserCredential'.'Test-FTPCredential','Test-SQLCredential','Convert-StringToHash' -ProjectUri 'https://github.com/tobor88/PowerShell-Red-Team' -ProcessorArchitecture 'None' -Tags 'PowerShell','CyberSecurity','InfoSec','PenetrationTesting','PenTesting','Shells','Security' -AliasesToExport @() -PowerShellHostVersion '5.0' -DotNetFrameworkVersion '3.5' -ClrVersion '3.5' -PowerShellHostName 'ConsoleHost' -IconURI 'https://img1.wsimg.com/isteam/ip/8f3c0f3f-85e4-413f-bd91-f19d4f317a5a/logo/967ca34c-6d9b-4d2f-9206-83481c35769d.png/:/rs=h:392/ll' -LicenseUri 'https://raw.githubusercontent.com/tobor88/PowerShell-Red-Team/master/LICENSE' -HelpInfoUri 'https://raw.githubusercontent.com/tobor88/PowerShell-Red-Team/master/README.md' -Copyright '(c) 2020 Robert H. Osborne. All rights reserved.' -PowerShellVersion '5.0'