PowerShellArsenal – PowerShell For Reverse Engineering: What You Need to Know
- houlepsipote
- Aug 15, 2023
- 1 min read
PowerShellArsenal is basically PowerShell for reverse engineering in a module format. The module can be used to disassemble managed and unmanaged code, perform .NET malware analysis, analyse/scrape memory, parse file formats and memory structures, obtain internal system information, etc.
Heres another bunch of links from my evernote, same reason applies for this post, since limits on whats accessible, I place em here. @LucaBongiorni/weaponizing-usb-gadgets-with-hid-devices-the-revenge-of-p4wnp1-a5615e909677 -vm -workbench-gui-for-volatility.html?amp=1&m=1 -base/tree/master/yara -systems.com/spark-core/ -systems.com/yara-rule-feed/ -nip-automated-basic-pentest-tool.html?amp=1&m=1 -rtfm/amp/?__twitter_impression=true -testing-active-directory-part-i/amp/?__twitter_impression=true -fast-incident-response.html?amp=1&m=1 -scans-website-and-suggests-security.html?m=1 -a-compendium-of-sites-that-you-can-practice-on-you-can-legally-hack-these-sites-karl-m-1 -hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6 -attack/car/tree/master/implementations/bzar -analysis-threat-intelligence-and-reverse-engineering 1 -lateral-movement-with-your.html?m=12 -exploit-framework.html?m=1 -live-memory-analysis-with-memory.html?m=1 -docs-staging.velocidex.com -powershell-module.html -framework-v20-generate-payloads.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+PentestTools+(PenTest+Tools)&m=1 -stalk-your-friends-find-their.html?m=1 -open-sourced-remote.html?utm_source=dlvr.it&utm_medium=twitter&m=1 -industrial-control-system.html?m=1
PowerShellArsenal – PowerShell For Reverse Engineering
2ff7e9595c



Comments