🦦
Otter's Notes
search
⌘Ctrlk
🦦
Otter's Notes
  • otterIntroduction
  • Articles
    • bombDumping data from the Microsoft Recall folder
    • bombGaining persistence on Windows with Time Providers
    • magnifying-glassReverse engineering LSASS to decrypt DPAPI keys
    • magnifying-glassIntro to Hypervisor Implants
    • magnifying-glassIn-depth Windows Telemetry
    • bombWindows of Opportunity: exploiting race conditions in Seclogon to dump LSASS
  • Notes
    • Active Directory
    • AAD
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
      • PowerShell Basics
      • PowerShell Remoting
      • Alternate PowerShell Hosts
      • PowerShell Pipeline Runners
      • PowerShell Code Signing
      • Scriptblock Logging
      • PowerShell CLM
      • AMSI
      • PowerShell Reflection
      • WMI - Windows Management Instrumentation
      • Interfacing with AD
      • PowerShell Snippets
        • Bypass application whitelisting and CLM with runscripthelper and WMI
        • Create fake PowerShell logs
        • Enumerate AD ACLs
        • Enumerate WMI events
        • Enumerate Domain Trusts
        • Enumerate change metadata
        • Enumerate non-signed service binaries
        • Enumerate with GPOs
        • Find signed alternate PowerShell hosts
        • Get AMSI module
        • Group processes by user with WMI
        • Hide processes from Get-Process
        • Malware re-purposing with PowerShell reflection
        • Monitor PowerShell hosts with WMI
        • PowerShell reflection offensive use-case
        • Query PowerShell alternative hosts with WMI
        • Retrieve file certificate
        • Search LDAP for misconfigurations
        • Sign custom code with PowerShell
        • WMI service creation
        • Weak folder permission enumeration
    • AWS
    • Binary Exploitation
    • Kernel Development
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Noteschevron-right
  2. PowerShell

PowerShell Snippets

Bypass application whitelisting and CLM with runscripthelper and WMIchevron-rightCreate fake PowerShell logschevron-rightEnumerate AD ACLschevron-rightEnumerate WMI eventschevron-rightEnumerate Domain Trustschevron-rightEnumerate change metadatachevron-rightEnumerate non-signed service binarieschevron-rightEnumerate with GPOschevron-rightFind signed alternate PowerShell hostschevron-rightGet AMSI modulechevron-rightGroup processes by user with WMIchevron-rightHide processes from Get-Processchevron-rightMalware re-purposing with PowerShell reflectionchevron-rightMonitor PowerShell hosts with WMIchevron-rightPowerShell reflection offensive use-casechevron-rightQuery PowerShell alternative hosts with WMIchevron-rightRetrieve file certificatechevron-rightSearch LDAP for misconfigurationschevron-rightSign custom code with PowerShellchevron-rightWMI service creationchevron-rightWeak folder permission enumerationchevron-right
PreviousInterfacing with ADchevron-leftNextBypass application whitelisting and CLM with runscripthelper and WMIchevron-right