A PowerShell post-exploitation framework for penetration testers, providing modules for code execution, persistence, reconnaissance, and credential theft.
PowerSploit is a PowerShell post-exploitation framework used by penetration testers and security researchers to perform advanced attacks after initial system compromise. It provides modules for executing code, maintaining persistence, bypassing antivirus, stealing credentials, and conducting reconnaissance, all while minimizing disk writes to evade detection. The framework is designed to integrate seamlessly into security assessments, offering a suite of tools that operate in memory to reduce forensic evidence.
Penetration testers, red teamers, and security professionals conducting authorized security assessments who need advanced post-exploitation capabilities on Windows systems. It is also used by researchers studying offensive security techniques and defense evasion.
Developers choose PowerSploit because it provides a comprehensive, PowerShell-native toolkit for post-exploitation that emphasizes stealth and operational security. Its modular design, in-memory execution, and avoidance of disk writes make it a preferred choice for evading endpoint detection and response (EDR) solutions during security engagements.
PowerSploit - A PowerShell Post-Exploitation Framework
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Emphasizes operational security by enabling tools like Invoke-Mimikatz to run entirely in memory, avoiding disk writes and reducing forensic evidence, as highlighted in the project philosophy.
Maintains compatibility with older Windows systems, ensuring wide applicability across environments, which is specified in the scripting standards for reliability.
Offers a full range of post-exploitation tools from code execution to reconnaissance, such as PowerUp for privilege escalation and PowerView for domain enumeration, covering all assessment phases.
Follows strict style guides with comment-based help and error handling, ensuring code quality and ease of use for penetration testers, as detailed in the contribution rules.
The project is explicitly marked as unsupported in the README, meaning no updates, bug fixes, or security patches, which increases risks of detection and compatibility issues in modern environments.
Relies entirely on PowerShell and Windows APIs, making it ineffective for cross-platform security assessments or cloud-based environments beyond traditional Windows systems.
Requires deep knowledge of PowerShell scripting and Windows internals, with modules like Invoke-ReflectivePEInjection demanding expertise for effective deployment, as indicated by the lack of beginner-friendly documentation.