A PowerShell framework for offensive security, penetration testing, and red teaming with scripts for all phases.
Nishang is a comprehensive framework and collection of PowerShell scripts and payloads designed for offensive security operations. It enables security professionals and red teams to leverage PowerShell for penetration testing, post-exploitation, and red teaming activities across all phases of an engagement, from initial access to lateral movement and persistence.
Security professionals, penetration testers, and red team operators who need to conduct authorized security assessments, exploit vulnerabilities, and simulate adversary attacks using PowerShell in Windows environments.
Developers choose Nishang for its extensive, modular collection of real-world attack scripts that emphasize in-memory execution to evade detection, its coverage of all penetration testing phases, and its practical focus on combining tools for complex attack chains in red team operations.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Includes scripts for all penetration testing phases, from Active Directory exploitation and client-side attacks to lateral movement and persistence, as detailed in the Key Features section.
Designed to run scripts in memory using methods like download strings and encoded commands, specifically to evade antivirus detection, as emphasized in the Anti Virus usage examples.
Scripts are modular and can be combined for complex attack chains, reflecting real-world red team operations based on the author's experience and linked blog posts.
Provides tools like Invoke-AmsiBypass and Invoke-Encode to bypass AMSI and antivirus, ensuring scripts can operate in monitored environments, as mentioned in the Bypass and Utility sections.
Most scripts are flagged as malicious by antivirus software, requiring obfuscation or exclusive in-memory execution, which adds operational complexity and risk of failure.
Primarily effective only in Windows environments with PowerShell enabled, limiting usability in cross-platform scenarios or where PowerShell is restricted or absent.
Requires advanced knowledge of PowerShell, networking, and attack methodologies to deploy and chain scripts effectively, with the README offering minimal beginner-friendly guidance.
Evasion techniques may become outdated as security patches are released, and the project relies on community contributions, potentially lagging behind the latest threat landscapes.