Cardboard Iguana Security
/
tags
/
Application
/
PowerShell
Dark mode
Light mode
Search
Search
37 items with this tag.
Sunday, January 5, 2025
Access the Windows Registry using PowerShell
HowTo
OS/Windows/Registry
Application/PowerShell
Sunday, January 5, 2025
Bypass the PowerShell execution policy
Application/PowerShell
OS/Windows
HowTo
AttackCycle/Exploitation
Sunday, January 5, 2025
Bypass Windows antivirus with C#
HowTo
AttackCycle/AntiForensics
OS/Windows
Application/PowerShell
Application/PowerShell/Invoke-Mimikatz
Sunday, January 5, 2025
Disable AMSI
HowTo
OS/Windows/AMSI
AttackCycle/AntiForensics
Application/PowerShell
OS/Windows/Defender
Sunday, January 5, 2025
Exploit Windows file associations
HowTo
AttackCycle/Exploitation
OS/Windows/Registry
Application/PowerShell
Application/netcat
Sunday, January 5, 2025
Exploit Windows shortcut files
AttackCycle/Exploitation
HowTo
Application/PowerShell
Application/netcat
OS/Windows
Sunday, January 5, 2025
Get-FileHash
Application/PowerShell
Cryptography/Hashes
Cryptography/Hashes/SHA256
Sunday, January 5, 2025
Get-WinEvent
OS/Windows/EventLog
Application/PowerShell
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Git on Windows
OS/Windows
Application/Git
Application/SSH
Application/PowerShell
Sunday, January 5, 2025
icacls
Application/icacls
Application/PowerShell
OS/Windows/Permissions
Sunday, January 5, 2025
Invoke-Mimikatz
Application/PowerShell/Invoke-Mimikatz
AttackCycle/PrivEsc
AttackCycle/LateralMovement
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Reconnaissance
AttackCycle/PrivEsc/PassTheHash
AttackCycle/LateralMovement/PassTheHash
Sunday, January 5, 2025
Invoke-WebRequest
Application/PowerShell
Sunday, January 5, 2025
Kerberoasting
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Exploitation/Kerberoasting
Application/PowerShell/Invoke-Kerberoast
Application/Hashcat
Application/JohnTheRipper
Sunday, January 5, 2025
Kerberos
Protocol/Kerberos
OS/Windows/ActiveDirectory
Application/Mimikatz
Application/Rubeus
FileFormat/kirbi
Cryptography/Hashes/NT
AttackCycle/PrivEsc
AttackCycle/LateralMovement
AttackCycle/Exploitation/Kerberoasting
Application/PowerShell/Invoke-Kerberoast
Application/Hashcat
Application/JohnTheRipper
OS/Linux/Distros/Kali
AttackCycle/Exploitation/AS-REPRoasting
AttackCycle/PrivEsc/GoldenTickets
AttackCycle/LateralMovement/SilverTickets
Sunday, January 5, 2025
meterpreter
Application/Metasploit/meterpreter
AttackCycle/Exploitation
AttackCycle/Reconnaissance
AttackCycle/AntiForensics
Cryptography/Hashes/NT
OS/Windows/SAM
AttackCycle/PrivEsc/GoldenTickets
Application/Mimikatz
OS/Windows/EventLog
Application/PowerShell
AttackCycle/PrivEsc
OS/Windows/LSASS
Sunday, January 5, 2025
MS SQL
Application/MSSQL
OS/Windows
Application/PowerShell/Powercat
Application/netcat
AttackCycle/PrivEsc
Sunday, January 5, 2025
Powercat
Application/PowerShell/Powercat
AttackCycle/LateralMovement
Application/netcat
OS/Linux/Distros/Kali
OS/Windows/AMSI
Sunday, January 5, 2025
PowerShell reverse shell
Application/PowerShell
AttackCycle/Exploitation
Application/whoami
Language/PHP
Sunday, January 5, 2025
PowerView
Application/PowerShell/PowerView
AttackCycle/Reconnaissance
OS/Windows/AMSI
Sunday, January 5, 2025
Remotely install a Windows package with PowerShell
HowTo
OS/Windows
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/Exploitation
Sunday, January 5, 2025
Run commands directly with PowerShell
Application/PowerShell
HowTo
Sunday, January 5, 2025
Run a remote Windows command using PowerShell
Application/PowerShell
OS/Windows
AttackCycle/LateralMovement
HowTo
Sunday, January 5, 2025
Set the PATH in a session on Windows
Application/PowerShell
OS/Windows
HowTo
Sunday, January 5, 2025
Set up WMI in PowerShell
OS/Windows/WMI
Application/PowerShell
HowTo
AttackCycle/LateralMovement
Sunday, January 5, 2025
socat
Application/socat
Application/netcat
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/AntiForensics
Sunday, January 5, 2025
Useful scripts for Windows reconnaissance
AttackCycle/Reconnaissance
OS/Windows
Application/WinPEAS
Application/Metasploit
Application/WindowsExploitSuggester
OS/Windows/Defender
Application/PowerShell/PowerUp
Application/Metasploit/meterpreter
Application/systeminfo
Sunday, January 5, 2025
Use WinRM with PowerShell
HowTo
Protocol/WinRM
Application/PowerShell
OS/Windows
Sunday, January 5, 2025
Windows reconnaissance with PowerShell
OS/Windows/ActiveDirectory
OS/Windows/Firewall
Application/PowerShell
OS/Windows
AttackCycle/Reconnaissance
OS/Windows/EventLog
OS/Windows/Services
Sunday, January 5, 2025
Windows Remote Management
Application/PowerShell
OS/Windows/Registry
OS/Windows/UAC
AttackCycle/LateralMovement
Protocol/WinRM
Sunday, January 5, 2025
Windows SeImpersonate and SeAssignPrimaryToken permissions
OS/Windows/Permissions/SeImpersonate
OS/Windows/Permissions/SeAssignPrimaryToken
Protocol/WinRM
Application/RogueWinRM
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/PrivEsc
Sunday, January 5, 2025
Windows service ACLs
OS/Windows/Permissions
OS/Windows/Services
Protocol/WinRM
Application/PowerShell
Sunday, January 5, 2025
winrs
OS/Windows
Application/winrs
Protocol/WinRM
Application/PowerShell
Sunday, January 5, 2025
wmic
OS/Windows
Application/wmic
Application/WindowsExploitSuggester
AttackCycle/Reconnaissance
AttackCycle/Exploitation
AttackCycle/LateralMovement
Application/PowerShell
Sunday, January 5, 2025
Working with services in PowerShell
Application/PowerShell
OS/Windows/Services
Sunday, January 5, 2025
Work with base64 encoding using PowerShell
HowTo
Application/PowerShell
Standard/Base64
Sunday, January 5, 2025
Work with remote services using WMI and PowerShell
OS/Windows/WMI
Application/PowerShell
OS/Windows/Services
HowTo
Sunday, January 5, 2025
Work with remote tasks using WMI and PowerShell
HowTo
Application/PowerShell
OS/Windows/Tasks
AttackCycle/Exploitation
AttackCycle/PrivEsc
OS/Windows/WMI