You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+25-25Lines changed: 25 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
-
#Nishang
1
+
#Nishang
2
2
3
-
###Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
3
+
###Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
4
4
By [nikhil_mitt](https://twitter.com/nikhil_mitt)
5
5
6
-
####Usage
6
+
####Usage
7
7
8
8
Import all the scripts in the current PowerShell session (PowerShell v3 onwards).
Nishang scripts are flagged by many Anti Viruses as malicious. The scrripts on a target are meant to be used in memory which is very easy to do with PowerShell. Two basic methods to execute PowerShell scripts in memory:
32
32
33
33
Method 1. Use the in-memory dowload and execute:
@@ -56,20 +56,20 @@ If the scripts still get detected changing the function and parameter names and
56
56
57
57
In case Windows 10's AMSI is still blocking script execution, see this blog: http://www.labofapenetrationtester.com/2016/09/amsi.html
58
58
59
-
####Scripts
59
+
####Scripts
60
60
Nishang currently contains the following scripts and payloads.
0 commit comments