└── README.md /README.md: -------------------------------------------------------------------------------- 1 | 2 | ## PowerView Aggressor Script for CobaltStrike 3 | 4 | #### A user menu for [@harmjoy's](https://twitter.com/harmj0y) [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) 5 | #### and [SharpView](https://github.com/tevora-threat/SharpView) 6 | 7 | #### Very similar to the PowerView v2 [aggressor script](https://github.com/tevora-threat/aggressor-powerview) 8 | 9 | All functions listed in the PowerView about page are included in this with all arguments for each function. 10 | 11 | ![powerview1](https://user-images.githubusercontent.com/9096315/43167904-31311bf4-8f50-11e8-9c89-1b86fb69e5ff.png) 12 | 13 | Has the ability to accept credentials (format: domain\user password to parse correctly) 14 | 15 | ![powerview2](https://user-images.githubusercontent.com/9096315/43167890-2d9f74e0-8f50-11e8-80e9-c994c54eb56b.png) 16 | 17 | With SharpView now has the ability to leverage execute-assembly and like before PowerPick and PowerShell 18 | 19 | ![powerview3](https://user-images.githubusercontent.com/9096315/43167896-30078ca4-8f50-11e8-9a6c-dcd333ddae1b.png) 20 | 21 | 22 | Now has a help menu that provides the description and Parameters from the PowerView.ps1 source 23 | 24 | ![powerview4](https://user-images.githubusercontent.com/9096315/43167905-31f7ae72-8f50-11e8-93b0-edb1df5b16f7.png) 25 | 26 | 27 | The script does not automatically do powershell-import for PowerView you must manually do that first. Additionally, depending on your placement of SharpView you may need to change the location in the $sharpviewlocation variable. 28 | 29 | Please note this requires PowerView 3.0 (current dev branch) and SharpView (only version) 30 | 31 | Blog [Here](https://threat.tevora.com/a-sharpview-and-more-aggressor) --------------------------------------------------------------------------------