🦦
Otter's Notes
Ctrlk
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
      • PowerShell Basics
      • PowerShell Remoting
      • Alternate PowerShell Hosts
      • PowerShell Pipeline Runners
      • PowerShell Code Signing
      • Scriptblock Logging
      • PowerShell CLM
      • AMSI
      • PowerShell Reflection
      • WMI - Windows Management Instrumentation
      • Interfacing with AD
      • PowerShell Snippets
        • Bypass application whitelisting and CLM with runscripthelper and WMI
        • Create fake PowerShell logs
        • Enumerate AD ACLs
        • Enumerate WMI events
        • Enumerate Domain Trusts
        • Enumerate change metadata
        • Enumerate non-signed service binaries
        • Enumerate with GPOs
        • Find signed alternate PowerShell hosts
        • Get AMSI module
        • Group processes by user with WMI
        • Hide processes from Get-Process
        • Malware re-purposing with PowerShell reflection
        • Monitor PowerShell hosts with WMI
        • PowerShell reflection offensive use-case
        • Query PowerShell alternative hosts with WMI
        • Retrieve file certificate
        • Search LDAP for misconfigurations
        • Sign custom code with PowerShell
        • WMI service creation
        • Weak folder permission enumeration
    • AWS
    • Binary Exploitation
    • Kernel Development
Powered by GitBook
On this page
  1. Notes
  2. PowerShell

PowerShell Snippets

Bypass application whitelisting and CLM with runscripthelper and WMICreate fake PowerShell logsEnumerate AD ACLsEnumerate WMI eventsEnumerate Domain TrustsEnumerate change metadataEnumerate non-signed service binariesEnumerate with GPOsFind signed alternate PowerShell hostsGet AMSI moduleGroup processes by user with WMIHide processes from Get-ProcessMalware re-purposing with PowerShell reflectionMonitor PowerShell hosts with WMIPowerShell reflection offensive use-caseQuery PowerShell alternative hosts with WMIRetrieve file certificateSearch LDAP for misconfigurationsSign custom code with PowerShellWMI service creationWeak folder permission enumeration
PreviousInterfacing with ADNextBypass application whitelisting and CLM with runscripthelper and WMI