This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#requires -version 2 | |
<# | |
File: PowerUpSQL.ps1 | |
Author: Scott Sutherland (@_nullbind), NetSPI - 2023 | |
Major Contributors: Antti Rantasaari and Eric Gruber | |
Version: 1.129 | |
Description: PowerUpSQL is a PowerShell toolkit for attacking SQL Server. | |
License: BSD 3-Clause | |
Required Dependencies: PowerShell v.2 | |
Optional Dependencies: None |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.Synopsis | |
Wrapper for Rubeus Version 2.3.0 | |
.EXAMPLE | |
Import-Module .\Invoke-Hagrid.ps1 | |
OR | |
. .\Invoke-Hagrid.ps1 | |
Invoke-Hagrid -command 'kerberoast /format:hashcat /outfile:C:\Temp\allKERB.txt' | |
.NOTES | |
For more examples see Rubeus documentation https://github.com/GhostPack/Rubeus |
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Invoke-Mimikatz | |
{ | |
<# | |
.SYNOPSIS | |
This script leverages Mimikatz 2.0 and Invoke-ReflectivePEInjection to reflectively load Mimikatz completely in memory. This allows you to do things such as | |
dump credentials without ever writing the mimikatz binary to disk. | |
The script has a ComputerName parameter which allows it to be executed against multiple computers. | |
This script should be able to dump credentials from any version of Windows through Windows 8.1 that has PowerShell v2 or higher installed. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Write-Host -ForegroundColor green " | |
________ __ _______ by Beau Bullock (@dafthack) | |
/_______/___________ ______ | |____/_______\__ __ ____ ____ ___________ | |
/___\ __\______\____\ \_____\|__|__\|________/__|__\/____\ /____\_/____\______\ | |
\ \_\ \ | \// __ \| |_/ | Y \ | \ | / | \ | \ ___/| | \/ | |
\________/__| (______/__| |___|__|____|___/____/|___|__/___|__/\___| >__| | |
Do service principals dream of electric sheep? | |
For usage information see the wiki here: https://github.com/dafthack/GraphRunner/wiki | |
To list GraphRunner modules run List-GraphRunnerModules |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.SYNOPSIS | |
PowerShell adaptation of WinPEAS.exe / WinPeas.bat | |
.DESCRIPTION | |
For the legal enumeration of windows based computers that you either own or are approved to run this script on | |
.EXAMPLE | |
# Default - normal operation with username/password audit in drives/registry | |
.\winPeas.ps1 | |
# Include Excel files in search: .xls, .xlsx, .xlsm |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Write-Host -ForegroundColor green " | |
________ __ _______ by Beau Bullock (@dafthack) | |
/_______/___________ ______ | |____/_______\__ __ ____ ____ ___________ | |
/___\ __\______\____\ \_____\|__|__\|________/__|__\/____\ /____\_/____\______\ | |
\ \_\ \ | \// __ \| |_/ | Y \ | \ | / | \ | \ ___/| | \/ | |
\________/__| (______/__| |___|__|____|___/____/|___|__/___|__/\___| >__| | |
Do service principals dream of electric sheep? | |
For usage information see the wiki here: https://github.com/dafthack/GraphRunner/wiki | |
To list GraphRunner modules run List-GraphRunnerModules |