From 620a2c0a2b9cc77c0a99cf2dc561892351977b48 Mon Sep 17 00:00:00 2001 From: "Nikhil \"SamratAshok\" Mittal" Date: Wed, 25 May 2016 00:41:20 +0530 Subject: [PATCH] Update README.md --- README.md | 22 +++++++++++++++++++++- 1 file changed, 21 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 3e81011..c3505e5 100644 --- a/README.md +++ b/README.md @@ -112,12 +112,20 @@ Create signed JAR files which can be used with applets for script and command ex [Out-Shortcut](https://github.com/samratashok/nishang/blob/master/Client/Out-Shortcut.ps1) -Create shortcut files capable of executing commands and scripts. +Create shortcut files capable of executing PowerShell commands and scripts. [Out-WebQuery](https://github.com/samratashok/nishang/blob/master/Client/Out-WebQuery.ps1) Create IQY files for phishing credentials and SMB hashes. +[Out-JS](https://github.com/samratashok/nishang/blob/master/Client/Out-JS.ps1) + +Create JS files capable of executing PowerShell commands and scripts. + +[Out-SCT](hhttps://github.com/samratashok/nishang/blob/master/Client/Out-SCT.ps1) + +Create SCT files capable of executing PowerShell commands and scripts. + #####Escalation [Enable-DuplicateToken](https://github.com/samratashok/nishang/blob/master/Escalation/Enable-DuplicateToken.ps1) @@ -149,6 +157,10 @@ Run PowerShell commands, native commands, or SQL commands on a MSSQL Server with Execute shellcode in memory using DNS TXT queries. +[Out-RundllCommand](https://github.com/samratashok/nishang/blob/master/Execution/Out-RundllCommand.ps1) + +Execute PowerShell commands and scripts or a reverse PowerShell session using rundll32.exe. + #####Gather [Check-VM](https://github.com/samratashok/nishang/blob/master/Gather/Check-VM.ps1) @@ -283,6 +295,14 @@ Interactive PowerShell using WMI. An interactive PowerShell reverse shell over ICMP. +[Invoke-JSRatRundll](https://github.com/samratashok/nishang/blob/master/Shells/Invoke-JSRatRundll.ps1) + +An interactive PowerShell reverse shell over HTTP using rundll32.exe. + +[Invoke-JSRatRegsvr](https://github.com/samratashok/nishang/blob/master/Shells/Invoke-JSRatRegsvr.ps1) + +An interactive PowerShell reverse shell over HTTP using regsvr32.exe. + #####Utility [Add-Exfiltration](https://github.com/samratashok/nishang/blob/master/Utility/Add-Exfiltration.ps1)