PoC jenkins files for generating PowerSharpPack payloads
Refer to the blog post here
- psp-confuser.groovy: Jenkins pipeline that uses ConfuserEx for obfuscation. Creates PSP payload.
- psp-inviscloak.groovy: Jenkins pipeline that uses InvisiblityCloak for obfuscation. Creates PSP payload.
- psp-invis-confuser.groovy: Jenkins pipeline that uses InvisibilityCloak + ConfuserEx. Creates PSP payload.
- assembly-invis-confuser.goorvy: Jenkins pipeline that uses InvisibilityCloak + ConfuserEx and only creates .NET assembly.
- test-jenkins.groovy: A simple sanity check jenkins pipeline.
- meta-example.groovy: Meta job that invokes
meta-Certify.groovy
andmeta-Rubeus.groovy
. - meta-Certify.groovy: Jenkins pipeline that creates Certify PSP payload.
- meta-Rubeus.groovy: Jenkins pipeline that creates Rubeus PSP payload.
- confuserEx.ps1: Creates confuserEx project (.crproj) file that
confuserex.cli.exe
will use. - embedDotNet.ps1: Embed .NET assembly into the
template.ps1
PSP payload template. - PSPprep.ps1: Change .NET tool's source code to set
public
for classes and themain()
method. - template.ps1: A PSP payload template. .NET assembly will get embedded here.
- Bunch of pipeline examples for popular projects
- Certify
- Rubeus
- SharpHound
- SharpUp
- SharpView
- Standin
- SharpDPAPI
- Remove
welcome()
banner fromchameleon
, causes character encoding error with Jenkins. psp-inviscloak.groovy
- If compilation fails because of invisibilitycloak, use the no-string option (remove-m <obs>
option)- Turn off defender!
- @S3cur3Th1sSh1t: For creating PowerSharpPack, and many other projects
- @HTTP418InfoSec: For the Jenkins blog post, which led me down to a rabbit hole
- @harmj0y: For the SO-CON 2020 talk, which inspired HTTP418InfoSec to write his blog post
- @h4wkst3r: For the InvisibilityCloak project
- @xenosCR / Conor Richard: For the OffSecOps setup blog post
- @klezVirus: For the Chameleon project