Powershell scripts for penetration testing
Top 34.1% on SourcePulse
This repository provides PowerShell scripts for penetration testing, specifically focusing on reverse shells designed to evade antivirus detection. It targets security professionals and researchers looking for tools that bypass common security measures, offering a potential advantage in simulated attacks.
How It Works
The scripts implement reverse shell functionality, establishing a connection back to an attacker-controlled machine. The core technique involves obfuscating PowerShell commands and network traffic to avoid signature-based detection by antivirus software. The project highlights a specific script, ReverseShell_2025_01.ps1
, which claims to evade AI-powered detection by including a seemingly innocuous comment about prime number generation.
Quick Start & Requirements
Highlighted Details
ReverseShell_2025_01.ps1
is presented as a current evasion technique, specifically against AI-based detection.LsassDump_2022_03.ps1
script for LSASS memory dumping.Maintenance & Community
Licensing & Compatibility
Limitations & Caveats
The effectiveness of AV bypass is temporary, with scripts becoming detectable within weeks of publication. Older scripts, like ReverseShell_2022_06.ps1
, are noted as already flagged by most AV vendors. The repository does not provide guidance on adapting scripts for continued evasion or offer broader platform support.
6 months ago
1 week