Cardboard Iguana Security
/
tags
/
Application
/
PowerShell
Dark mode
Light mode
Search
Search
37 items with this tag.
Wednesday, December 18, 2024
Access the Windows Registry using PowerShell
HowTo
OS/Windows/Registry
Application/PowerShell
Wednesday, December 18, 2024
Bypass the PowerShell execution policy
Application/PowerShell
OS/Windows
HowTo
AttackCycle/Exploitation
Wednesday, December 18, 2024
Bypass Windows antivirus with C#
HowTo
AttackCycle/AntiForensics
OS/Windows
Application/PowerShell
Application/PowerShell/Invoke-Mimikatz
Wednesday, December 18, 2024
Disable AMSI
HowTo
OS/Windows/AMSI
AttackCycle/AntiForensics
Application/PowerShell
OS/Windows/Defender
Wednesday, December 18, 2024
Exploit Windows file associations
HowTo
AttackCycle/Exploitation
OS/Windows/Registry
Application/PowerShell
Application/netcat
Wednesday, December 18, 2024
Exploit Windows shortcut files
AttackCycle/Exploitation
HowTo
Application/PowerShell
Application/netcat
OS/Windows
Wednesday, December 18, 2024
Get-FileHash
Application/PowerShell
Cryptography/Hashes
Cryptography/Hashes/SHA256
Wednesday, December 18, 2024
Get-WinEvent
OS/Windows/EventLog
Application/PowerShell
AttackCycle/Reconnaissance
Wednesday, December 18, 2024
Git on Windows
OS/Windows
Application/Git
Application/SSH
Application/PowerShell
Wednesday, December 18, 2024
icacls
Application/icacls
Application/PowerShell
OS/Windows/Permissions
Wednesday, December 18, 2024
Invoke-Mimikatz
Application/PowerShell/Invoke-Mimikatz
AttackCycle/PrivEsc
AttackCycle/LateralMovement
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Reconnaissance
AttackCycle/PrivEsc/PassTheHash
AttackCycle/LateralMovement/PassTheHash
Wednesday, December 18, 2024
Invoke-WebRequest
Application/PowerShell
Wednesday, December 18, 2024
Kerberoasting
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Exploitation/Kerberoasting
Application/PowerShell/Invoke-Kerberoast
Application/Hashcat
Application/JohnTheRipper
Wednesday, December 18, 2024
Kerberos
Protocol/Kerberos
OS/Windows/ActiveDirectory
Application/Mimikatz
Application/Rubeus
FileFormat/kirbi
Cryptography/Hashes/NT
AttackCycle/PrivEsc
AttackCycle/LateralMovement
AttackCycle/Exploitation/Kerberoasting
Application/PowerShell/Invoke-Kerberoast
Application/Hashcat
Application/JohnTheRipper
OS/Linux/Distros/Kali
AttackCycle/Exploitation/AS-REPRoasting
AttackCycle/PrivEsc/GoldenTickets
AttackCycle/LateralMovement/SilverTickets
Wednesday, December 18, 2024
meterpreter
Application/Metasploit/meterpreter
AttackCycle/Exploitation
AttackCycle/Reconnaissance
AttackCycle/AntiForensics
Cryptography/Hashes/NT
OS/Windows/SAM
AttackCycle/PrivEsc/GoldenTickets
Application/Mimikatz
OS/Windows/EventLog
Application/PowerShell
AttackCycle/PrivEsc
OS/Windows/LSASS
Wednesday, December 18, 2024
MS SQL
Application/MSSQL
OS/Windows
Application/PowerShell/Powercat
Application/netcat
AttackCycle/PrivEsc
Wednesday, December 18, 2024
Powercat
Application/PowerShell/Powercat
AttackCycle/LateralMovement
Application/netcat
OS/Linux/Distros/Kali
OS/Windows/AMSI
Wednesday, December 18, 2024
PowerShell reverse shell
Application/PowerShell
AttackCycle/Exploitation
Application/whoami
Language/PHP
Wednesday, December 18, 2024
PowerView
Application/PowerShell/PowerView
AttackCycle/Reconnaissance
OS/Windows/AMSI
Wednesday, December 18, 2024
Remotely install a Windows package with PowerShell
HowTo
OS/Windows
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/Exploitation
Wednesday, December 18, 2024
Run commands directly with PowerShell
Application/PowerShell
HowTo
Wednesday, December 18, 2024
Run a remote Windows command using PowerShell
Application/PowerShell
OS/Windows
AttackCycle/LateralMovement
HowTo
Wednesday, December 18, 2024
Set the PATH in a session on Windows
Application/PowerShell
OS/Windows
HowTo
Wednesday, December 18, 2024
Set up WMI in PowerShell
OS/Windows/WMI
Application/PowerShell
HowTo
AttackCycle/LateralMovement
Wednesday, December 18, 2024
socat
Application/socat
Application/netcat
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/AntiForensics
Wednesday, December 18, 2024
Useful scripts for Windows reconnaissance
AttackCycle/Reconnaissance
OS/Windows
Application/WinPEAS
Application/Metasploit
Application/WindowsExploitSuggester
OS/Windows/Defender
Application/PowerShell/PowerUp
Application/Metasploit/meterpreter
Application/systeminfo
Wednesday, December 18, 2024
Use WinRM with PowerShell
HowTo
Protocol/WinRM
Application/PowerShell
OS/Windows
Wednesday, December 18, 2024
Windows reconnaissance with PowerShell
OS/Windows/ActiveDirectory
OS/Windows/Firewall
Application/PowerShell
OS/Windows
AttackCycle/Reconnaissance
OS/Windows/EventLog
OS/Windows/Services
Wednesday, December 18, 2024
Windows Remote Management
Application/PowerShell
OS/Windows/Registry
OS/Windows/UAC
AttackCycle/LateralMovement
Protocol/WinRM
Wednesday, December 18, 2024
Windows SeImpersonate and SeAssignPrimaryToken permissions
OS/Windows/Permissions/SeImpersonate
OS/Windows/Permissions/SeAssignPrimaryToken
Protocol/WinRM
Application/RogueWinRM
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/PrivEsc
Wednesday, December 18, 2024
Windows service ACLs
OS/Windows/Permissions
OS/Windows/Services
Protocol/WinRM
Application/PowerShell
Wednesday, December 18, 2024
winrs
OS/Windows
Application/winrs
Protocol/WinRM
Application/PowerShell
Wednesday, December 18, 2024
wmic
OS/Windows
Application/wmic
Application/WindowsExploitSuggester
AttackCycle/Reconnaissance
AttackCycle/Exploitation
AttackCycle/LateralMovement
Application/PowerShell
Wednesday, December 18, 2024
Working with services in PowerShell
Application/PowerShell
OS/Windows/Services
Wednesday, December 18, 2024
Work with base64 encoding using PowerShell
HowTo
Application/PowerShell
Standard/Base64
Wednesday, December 18, 2024
Work with remote services using WMI and PowerShell
OS/Windows/WMI
Application/PowerShell
OS/Windows/Services
HowTo
Wednesday, December 18, 2024
Work with remote tasks using WMI and PowerShell
HowTo
Application/PowerShell
OS/Windows/Tasks
AttackCycle/Exploitation
AttackCycle/PrivEsc
OS/Windows/WMI