kyou
search
⌘Ctrlk
kyou
  • WHOAMI
    • Robemar Aviles
  • Tryhackme
    • View
  • Hack the box
    • View
  • Academy HTB
    • View
  • Over The Wire
    • View
  • Under The Wire
    • View
  • PicoCTF
    • View
  • Portswigger
    • View
  • Hacker101
    • View
  • Python
    • View
  • SQL
    • View
  • Notes
    • View
  • Commands
    • View
      • Windows
        • Get-ADGroupMember
        • Get-ADGroup
        • Get-ADTrust
        • Get-ADUser
        • Get-ADDomain
        • Discover Modules
        • Get-LAPSComputers
        • Find-AdmPwdExtendedRights
        • Get-AppLockerPolicy
        • DomainPasswordSpray
        • PowerView
        • Inveight
        • Rubeus.exe
        • mimikatz.exe
        • Invoke-TheHash
        • laZagne.exe
        • Copying NTDS.dit via evil-winrm
        • Copying Registry Hives with reg.exe
        • reg add
        • net start
        • tscon
        • query user
        • New-PSDrive
        • findstr
        • dir
        • net use
        • net
        • Get-MpComputerStatus
        • Get-WmiObject
        • Get-ExecutionPolicy
        • get-alias
        • Get-ChildItem
        • Get-ACL
        • services.msc
        • tree
        • wmic
        • sc
        • icacls
        • winPEAS
        • Invoke-WebRequest
        • Certutil
        • Get-Service
      • Linux
      • LOLbas/GTFObins
      • SQL Injection
      • LFI
  • Google Chrome Password
  • Comptia Security+ 701
  • CCNA
  • Malware Analysis Lab
  • TCM
    • Linux 100: Fundamentals
    • Programming 100: Fundamentals
    • Practical Bug Bounty
    • Practical Web Hacking
    • Web pen
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Commandschevron-right
  2. View

Windows

Get-ADGroupMemberchevron-rightGet-ADGroupchevron-rightGet-ADTrustchevron-rightGet-ADUserchevron-rightGet-ADDomainchevron-rightDiscover Moduleschevron-rightGet-LAPSComputerschevron-rightFind-AdmPwdExtendedRightschevron-rightGet-AppLockerPolicychevron-rightDomainPasswordSpraychevron-rightPowerViewchevron-rightInveightchevron-rightRubeus.exechevron-rightmimikatz.exechevron-rightInvoke-TheHashchevron-rightlaZagne.exechevron-rightCopying NTDS.dit via evil-winrmchevron-rightCopying Registry Hives with reg.exechevron-rightreg addchevron-rightnet startchevron-righttsconchevron-rightquery userchevron-rightNew-PSDrivechevron-rightfindstrchevron-rightdirchevron-rightnet usechevron-rightnetchevron-rightGet-MpComputerStatuschevron-rightGet-WmiObjectchevron-rightGet-ExecutionPolicychevron-rightget-aliaschevron-rightGet-ChildItemchevron-rightGet-ACLchevron-rightservices.mscchevron-righttreechevron-rightwmicchevron-rightscchevron-righticaclschevron-rightwinPEASchevron-rightInvoke-WebRequestchevron-rightCertutilchevron-rightGet-Servicechevron-right
PreviousViewchevron-leftNextGet-ADGroupMemberchevron-right

Last updated 1 year ago