Red/Blue Cheatsheet | NORI ZAMURAI
  • Introduction
  • Pentesting Cheatsheets
    • Reconnaissance
      • Other method
      • Nmap
    • Enumeration
      • DNS (53)
      • SSH (22)
      • FTP (21)
      • SMTP (25)
      • WEB (80,443)
      • POP3 (110)
      • SMB (139,445)
      • MySQL (3306)
    • Privilege Escalation
      • Linux
      • Windows
    • Shell
      • Reverse Shell
      • Upgrade Shell
      • Meterpreter
    • Password Crack
      • Hash Analysis
      • Bruteforce
    • Exploit
      • Search Exploit
      • Attacks
    • Paylaod
      • Msfvenom
    • File Transfer
    • Port Forwarding
    • Service Login and Interaction
  • Useful Commands
    • Linux Commands
    • Powershell
    • CMD
    • Python
    • Editor: Vi & Tmux
    • Metasploit
    • Powershell Empire
Powered by GitBook
On this page

Was this helpful?

  1. Useful Commands

Powershell

Get-Process notepad | Stop-Process -Force
# Kill process

$p = Get-Process notepad
$p | gm -foce
# Explore the methods and properties for an object
$p.CloseMainWindows
# Call specific function

Grep

Select-String -Path "audit.log" -Pattern "logon failed" -Context 2, 3
# display lines before /after match
PreviousLinux CommandsNextCMD

Last updated 5 years ago

Was this helpful?