A PowerShell runspace post-exploitation toolkit written in C# that bypasses security mitigations and includes offensive modules.
p0wnedShell is a PowerShell runspace post-exploitation toolkit written in C# that executes PowerShell commands within a .NET environment without using powershell.exe. It bundles offensive modules like PowerSploit, Mimikatz, and BloodHound to facilitate attacks in Active Directory environments while bypassing security mitigations. The tool enables red teams to perform stealthy post-exploitation and helps blue teams develop defensive strategies.
Security professionals, red teamers, and penetration testers conducting post-exploitation activities in Windows and Active Directory environments. It is also useful for blue teams seeking to understand and defend against advanced attack techniques.
Developers choose p0wnedShell for its ability to run PowerShell offensively without triggering detections on powershell.exe, its comprehensive integration of popular exploitation tools, and its features for process masquerading and privilege escalation that enhance stealth and effectiveness in security assessments.
PowerShell Runspace Post Exploitation Toolkit
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Executes PowerShell commands within a .NET runspace without powershell.exe, avoiding common detection methods as highlighted in the README's runspace execution feature.
Bundles popular tools like PowerSploit, Mimikatz, and BloodHound, loaded in memory from Base64-encoded compressed strings for comprehensive post-exploitation tasks.
Includes process masquerading via AutoMasq and parent process spoofing to mimic legitimate processes or services, enhancing stealth in security assessments.
Provides specific methods to bypass AppLocker using InstallUtil.exe for both x86 and x64 binaries, as detailed in the usage instructions.
The README admits that parent process spoofing doesn't work from a Meterpreter session, limiting integration with common penetration testing frameworks.
The TODO list includes unadded features like tab completion and more attacks, plus acknowledged bugs such as console redirection problems, indicating incomplete development.
Requires Microsoft Visual Studio for compilation and manual configuration of AutoMasq options, adding overhead for users without C# expertise.