Skip to content

Instantly share code, notes, and snippets.

@cemtopkaya
Last active April 28, 2023 23:34
Show Gist options
  • Save cemtopkaya/5fd9b7ca5effefc18be25521b9001713 to your computer and use it in GitHub Desktop.
Save cemtopkaya/5fd9b7ca5effefc18be25521b9001713 to your computer and use it in GitHub Desktop.
Windows komutları, dosyalar ve yardım bilgileri.

windows terminal'in

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Directory\Background\shell\wt] @="Open Windows Terminal here"

[HKEY_CLASSES_ROOT\Directory\Background\shell\wt] @="Windows terminal here" "Icon"="C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\Assets\Threat.contrast-black.ico"

[HKEY_CLASSES_ROOT\Directory\Background\shell\wt\command] @="C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.16.10261.0_x64__8wekyb3d8bbwe\wt.exe -d ."

Bir işlemin ağ trafiğini görüntülemek

Edge sekmelerinden başlığında "Adminer" kelimesi geçen prosesin ID değerinin geçtği netstat çıktısının satırını getirir:

while ($true) { netstat -tno | findstr (Get-Process -Name msedge | Where-Object MainWindowTitle -like "*Adminer*").Id; Start-Sleep -Seconds 1 }
Get-Process -Name msedge | Select-Object Id, Name, MainWindowTitle | Where-Object MainWindowTitle -like "*Adminer*"

tshark ile Yakalanan paketleri Wireshark üstünde görüntüle

tshark.exe -F pcap -w - | Wireshark.exe -k -i -
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment