📔
eCPPTv2 Notes
Ctrlk
  • About
  • 1-System Security
  • 2-Network Security
  • 3-Powershell for Pentesters
    • Introduction
    • PowerShell Fundamentals
    • Offensive PowerShell
      • Downloading & Execution
      • Obfuscation
      • Information Gathering & Recon
      • Post-Exploitation With Powershell
      • References
Powered by GitBook
On this page

Was this helpful?

  1. 3-Powershell for Pentesters
  2. Offensive PowerShell

References

1- WebClient

2- Download File String

3- New-Object

4- WebRequests

5- Invoke-Expression

6- COM Objects

7- Download String Method

8- XmlDocument

9- DLL Injection

10- EmpireShell

11- Invoke-CradleCrafter

12- Get-HttpStatus

13- Invoke-Obfuscation

14- Posh-SecMod

15- PowerSploit

16- Nishang

17- Invoke-Portscan

18- Psgetsystem

PreviousPost-Exploitation With Powershell

Last updated 4 years ago

Was this helpful?