Command()- Loads the Mimikatz PE withPE.Load()and executes a chosen Mimikatz command.LogonPasswords()- Loads the Mimikatz PE withPE.Load()and executes the Mimikatz command to retrieve plaintext passwords from LSASS. Equates toCommand("privilege::debug sekurlsa::logonPasswords"). (Requires Admin)SamDump()- Loads the Mimikatz PE withPE.Load()and executes the Mimikatz command to retrieve password hashes from the SAM database. Equates toCommand("privilege::debug lsadump::sam"). (Requires Admin)LsaSecrets()- Loads the Mimikatz PE withPE.Load()and executes the Mimikatz command to retrieve LSA secrets stored in registry. Equates toCommand("privilege::debug lsadump::secrets"). (Requires Admin)LsaCache()- Loads the Mimikatz PE withPE.Load()and executes the Mimikatz command to retrieve Domain Cached Credentials hashes from registry. Equates toCommand("privilege::debug lsadump::cache"). (Requires Admin)Wdigest()- Loads the Mimikatz PE withPE.Load()and executes the Mimikatz command to retrieve Wdigest credentials from registry. Equates toCommand("sekurlsa::wdigest").All()- Loads the Mimikatz PE withPE.Load()and executes each of the above builtin, local credential dumping commands. (Requires Admin)DCSync()- Loads the Mimikatz PE withPE.Load()and executes the "dcsync" module to retrieve the NTLM hash of a specified (or all) Domain user. (Requires Domain Admin (or equivalent rights))PassTheHash()- Loads the Mimikatz PE withPE.Load()and executes the "pth" module to start a new process as a user using an NTLM password hash for authentication. (Requires Admin)
WhoAmI()- Gets the username of the currently used/impersonated token.ImpersonateUser()- Impersonate the token of a process owned by the specified user. Used to execute subsequent commands as the specified user. (Requires Admin)ImpersonateProcess()- Impersonate the token of the specified process. Used to execute subsequent commands as the user associated with the token of the specified process. (Requires Admin)GetSystem()- Impersonate the SYSTEM user. Equates toImpersonateUser("NT AUTHORITY\SYSTEM"). (Requires Admin)BypassUAC()- Bypasses UAC through token duplication and spawns a specified process with high integrity. (Requires Admin)RunAs()- Makes a new token to run a specified function as a specified user with a specified password. Automatically callsRevertToSelf()after executing the function.MakeToken()- Makes a new token with a specified username and password, and impersonates it to conduct future actions as the specified user.RevertToSelf()- Ends the impersonation of any token, reverting back to the initial token associated with the current process. Useful in conjuction with functions that impersonate a token and do not automatically RevertToSelf, such as:ImpersonateUser(),ImpersonateProcess(),GetSystem(), andMakeToken().EnableTokenPrivilege()- Enables a specified security privilege for a specified token. (Requires Admin)
GetProcessList()- Gets a list of running processes on the system.GetArchitecture()- Gets the architecuture of the OS.GetParentProcess()- Gets the parent process if of a process.GetProcessOwner()- Gets the username of the owner of a process.IsWow64()- Checks if a process is a Wow64 process.CreateProcessDump()- Creates a minidump of the memory of a running process. Useful for offline Mimikatz if dumping the LSASS process. (Requires Admin)GetHostname()- Gets the hostname of the system.GetUsername()- Gets the current Domain and username of the process running.GetCurrentDirectory()- Gets the current working directory full path.GetDacl()- Gets the Discretionary Access Control List (DACL) of a file or directory.GetDirectoryListing()- Gets a directory listing of the current working directory.ChangeCurrentDirectory()- Changes the current directory by appending a specified string to the current working directory.
PortScan()- Conducts a port scan of specified computer(s) and port(s) and reports open ports.Ping()- Pings specified computer(s) to identify live systems.
GetDomainUsers()- Gets a list of specified (or all) userDomainObjects in the current Domain.GetDomainGroups()- Gets a list of specified (or all) groupDomainObjects in the current Domain.GetDomainComputers()- Gets a list of specified (or all) computerDomainObjects in the current Domain.GetDomainSPNTickets()- GetsSPNTickets for specifiedDomainObjects.Kerberoast()- Gets a list ofSPNTickets for specified (or all) users with a SPN set in the current Domain.
GetNetLocalGroups()- Gets a list ofLocalGroups from specified remote computer(s).GetNetLocalGroupMembers()- Gets a list ofLocalGroupMembers from specified remote computer(s) for a specified group.GetNetLoggedOnUsers()- Gets a list ofLoggedOnUsers from specified remote computer(s).GetNetSessions()- Gets a list ofSessionInfos from specified remote computer(s).GetNetShares()- Gets a list ofShareInfos from specified remote computer(s).
StartKeylogger()- Starts a keylogger that gets keystrokes for a specified amount of time.
PatchAmsiScanBuffer()- Patch the AmsiScanBuffer function in amsi.dll to disable the AMSI for the current process.
Load()- Loads a .NET assembly byte array or base64-encoded byte array.AssemblyExecute()- Loads a .NET assembly byte array or base64-encoded byte array and executes a specified method within a specified type with specified parameters using reflection.
Load()- Loads a PE with a specified byte array. (Requires Admin) **(Currently broken. Works for Mimikatz, but not arbitrary PEs)GetFunctionExport()- Get a pointer to an exported function in a loaded PE. The pointer can then be used to execute the function in the PE.
PowerShellExecute()- Executes specified PowerShell code using System.Management.Automation.dll and bypasses AMSI, ScriptBlock Logging, and Module Logging (but not Transcription Logging).CreateProcess()- Creates a specified process, optionally with an alternative username and password. Uses the CreateProcess API and returns the output of the process.CreateCmdProcess()- Creates a specified cmd.exe process, optionally with an alternative username and password. Uses the CreateProcess API and returns the output of the process.ShellExecute()- Executes a specified shell command, optionally with an alternative username and password. Uses the ShellExecuteEx API and does not return the output of the command.ShellCmdExecute()- Executes a specified cmd.exe shell command, optionally with an alternative username and password. Uses the ShellExecuteEx API and does not return the output of the command.Execute()- Executes a specified command, optionally with an alternative username and password. May return the output of the command, depending upon the value of the UseShellExecute parameter.CreateProcessWithToken()- Creates a specified process with an impersonated token. Uses the CreateProcessWithToken API and returns the output of the process. (Requires Admin)
The SharpSploit.Execution.ShellCode class includes a method for executing shellcode. Shellcode execution is accomplished by copying it to pinned memory, modifying the memory permissions with Win32.Kernel32.VirtualProtect(), and executing with a .NET delegate.
The SharpSploit.Execution.ShellCode class includes the following primary function:
ShellCodeExecute()- Executes a specified shellcode byte array by copying it to pinned memory, modifying the memory permissions withWin32.Kernel32.VirtualProtect(), and executing with a .NETdelegate.
Win32 contains a library of enums and structures for Win32 API functions that can be used with PlatformInvoke or DynamicInvoke function execution.
Native contains a library of enums and structures for Native NT API functions that can be used PlatformInvoke or DynamicInvoke function execution.
The SharpSploit.Execution.PlatformInvoke namespace contains classes for invoking unmanaged exported DLL functions from the Win32 API or the Native NT API.
The SharpSploit.Execution.PlatformInvoke.Win32 class contains a library of PlatformInvoke signatures for Win32 API functions.
The SharpSploit.Execution.PlatformInvoke.Native class contains a library of PlatformInvoke signatures for NT API functions.
The SharpSploit.Execution.DynamicInvoke namespace contains classes for dynamically invoking unmanaged DLL functions. Allows the user to call functions in Win32, the NT API, or third-party APIs without using P/Invoke. This avoids suspicious imports and can help evade static analysis tools. It also assists in invoking unmanaged code from function pointers, which can be used to invoke shellcode, exported functions from manually mapped DLLs, direct syscall execution, or many other use cases. Helper functions are also included for manually mapping PE modules in a variety of ways, including Module Overloading.
Function prototypes for delegates are much less forgiving than P/Invoke. Data types used as parameters must have exactly the same format in memory as the unmanaged function expects, whereas P/Invoke is forgiving and lets you use data types that are close but not the same. There is no existing library of delegates that is verified to be compatable with the Win32 and NT APIs. As such, the library of delegates in SharpSploit will be updated over time as they are discovered, tested, and used by SharpSploit commands.
The SharpSploit.Execution.DyanmicInvoke.Win32 class contains a library of DyanmicInvoke signatures for Win32 API functions.
The SharpSploit.Execution.DyanmicInvoke.Native class contains a library of DyanmicInvoke signatures for NT API functions.
The SharpSploit.Execution.DynamicInvoke.Generic class contains helper functions for invoking arbitrary unmanaged functions by name or from pointers.
DynamicAPIInvoke()- Dynamically invokes a specified API call from a DLL on disk.DynamicFunctionInvoke()- Dynamically invokes a function at a specified pointer.LoadModuleFromDisk()- ResolvesLdrLoadDlland uses that function to load a DLL from disk.GetLibraryAddress()- Helper function that obtains the pointer to a function using in-memory export parsing.GetLoadedModuleAddress()- Gets the base address of a module loaded by the current process.GetPebLdrModuleEntry()- Helper for getting the base address of a module loaded by the current process. This base address could be passed toGetProcAddress/GetNativeExportAddress/LdrGetProcedureAddressor it could be used for manual export parsing.GetAPIHash()- Gets a HMAC-MD5 hash for unique hash based API lookups.GetExportAddress()- Gets the address of an exported function given the base address of a module.GetNativeExportAddress()- Given a module base address, resolve the address of a function by callingLdrGetProcedureAddress.GetPeMetaData()- Retrieve PE header information from the module base pointer.GetApiSetMapping()- Resolve host DLL for API Set DLL (Win10+).CallMappedPEModule()- Call a manually mapped PE by its EntryPoint.CallMappedDLLModule()- Call a manually mapped DLL by DllMain -> DLL_PROCESS_ATTACH.CallMappedDLLModuleExport()- Call a manually mapped DLL by Export.GetSyscallStub()- Read ntdll from disk, find/copy the appropriate syscall stub and free ntdll.
The SharpSploit.Execution.ManualMap.Map class contains helper functions for manually mapping PE modules.
MapModuleFromDisk()- Maps a module from disk into a Section usingNtCreateSection.AllocateFileToMemory()- Allocate file to memory, either from disk or from a byte array.RelocateModule()- Relocates a module in memory.MapModuleToMemory()- Manually map module into current process.SetModuleSectionPermissions()- Set correct module section permissions.RewriteModuleIAT()- Rewrite IAT for manually mapped module.
The SharpSploit.Execution.ManualMap.Overload class contains helper functions for Module Overloading.
FindDecoyModule()- Locate a signed module with a minimum size which can be used for overloading.OverloadModule()- Load a signed decoy module into memory, creating legitimate file-backed memory sections within the process. Afterwards overload that module by manually mapping a payload in it's place causing the payload to execute from what appears to be file-backed memory.
The SharpSploit.Execution.Injection namespace contains classes for modular process injection components that can be combined to build custom injectors. An AllocationTechnique makes a PayloadType available to the target process. An ExecutionTechnique executes a PayloadType that is present in memory within a target process.
The SharpSploit.Execution.Injection.AllocationTechnique class is an abstract parent class providing the requirements for all allocation components.
The SharpSploit.Execution.Injection.SectionMapAlloc class inherits from AllocationTechnique and is an Allocation component that allocates a payload to a target process using a locally-written, remotely-mapped shared memory section.
The SharpSploit.Execution.Injection.ExecutionTechnique class is an abstract parent class providing the requirements for all execution components.
The SharpSploit.Execution.Injection.RemoteThreadCreate class inherits from ExecutionTechnique and is an Execution component that executes a payload in a remote process by creating a new thread. Allows the user to specify which API call to use for remote thread creation.
The SharpSploit.Execution.Injection.PayloadType class is an abstract parent class providing the requirements for all types of payloads. Allocation and Execution components may behave differently for each subclass of PayloadType.
The SharpSploit.Execution.Injection.Injector class provides static functions for performing injection using a combination of Allocation and Execution components, along with a Payload.
WMIExecute()- Execute a process on a remote system with Win32_Process Create4 with specified credentials.
DCOMExecute()- Execute a command on a remote system using various DCOM methods.
GetService()- Gets a service on a remote machine.GetServices()- Gets a list of all services on a remote machine.CreateService()- Creates a service on a remote machine.StartService()- Starts a service on a remote machine.StopService()- Stops a service on a remote machine.DeleteService()- Deletes a service on a remote machine.PSExec()- Executes a command on a remote computer using a PSExec-like technique.
InvokeCommand()- Invoke a PowerShell command on a remote machine.