Names | PowerSploit | |
Category | Tools | |
Type | Reconnaissance, Backdoor, Info stealer, Exfiltration | |
Description | PowerSploit is an open source, offensive security framework comprised of PowerShell modules and scripts that perform a wide range of tasks related to penetration testing such as code execution, persistence, bypassing anti-virus, recon, and exfiltration. | |
Information | <https://github.com/PowerShellMafia/PowerSploit> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0194/> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:powersploit> |
Last change to this tool card: 22 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
APT 32, OceanLotus, SeaLotus | ![]() | 2013-Dec 2020 ![]() | ![]() | ||
APT 33, Elfin, Magnallium | ![]() | 2013-Nov 2019 | |||
CostaRicto | [Unknown] | 2017 | |||
MuddyWater, Seedworm, TEMP.Zagros, Static Kitten | ![]() | 2017-Dec 2020 ![]() | ![]() | ||
Patchwork, Dropping Elephant | ![]() | 2013-Mar 2018 | |||
PowerPool | [Unknown] | 2018 | |||
Stone Panda, APT 10, menuPass | ![]() | 2006-Jul 2020 | ![]() | ||
Other groups | |||||
Indrik Spider | ![]() | 2014-Jul 2020 | ![]() | ||
Wizard Spider, Gold Blackburn | ![]() | 2014-Nov 2020 ![]() | ![]() |
9 groups listed (7 APT, 2 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |