PS>Punch combines some of the best projects in the infosec powershell community into a self contained executable. It’s designed to evade antivirus and Incident Response teams.
- It doesn’t rely on powershell.exe. Instead it calls powershell directly through the dotNet framework.
- The modules that are bundled with the exe are encrypted. When PS>Punch starts, they are decrypted into memory. The unencrypted payloads never touch disk, making it difficult for most antivirus engines to catch them.
Offensively, PS>Punch contains commands for Privilege Escalation, Recon and Data Exfilitration. It does this by including the following modules and commands:
An portable console aimed at making pentesting with PowerShell a little easier
PS>Punch is in a super limited Proof of Concept state ATM.
Source && Download