-
Notifications
You must be signed in to change notification settings - Fork 0
/
search_terms.txt
312 lines (312 loc) · 5.04 KB
/
search_terms.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
invoke-dllinjection
invoke-shellcode
invoke-wmicommand
get-gpppassword
get-keystrokes
get-timedscreenshot
get-vaultcredential
invoke-credentialinjection
invoke-ninjacopy
invoke-tokenmanipulation
out-minidump
volumeshadowcopytools
invoke-reflectivepeinjection
invoke-userhunter
find-gpolocation
invoke-aclscanner
invoke-downgradeaccount
get-serviceunquoted
get-servicefilepermission
get-servicepermission
invoke-serviceabuse
install-servicebinary
get-regautologon
get-vulnautorun
get-vulnschtask
get-unattendedinstallfile
get-applicationhost
get-regalwaysinstallelevated
get-unconstrained
add-regbackdoor
add-scrnsavebackdoor
gupt-backdoor
invoke-adsbackdoor
enabled-duplicatetoken
invoke-psuacme
remove-update
check-vm
get-lsasecret
get-passhashes
show-targetscreen
port-scan
invoke-poshrathttp
invoke-powershelltcp
invoke-powershellwmi
add-exfiltration
add-persistence
do-exfiltration
start-captureserver
get-chromedump
get-clipboardcontents
get-foxdump
get-indexeditem
get-screenshot
invoke-inveigh
responder
invoke-netripper
invoke-egresscheck
invoke-postexfil
invoke-psinject
runas
mailraider
new-honeyhash
set-macattribute
invoke-dcsync
invoke-powerdump
exploit-jboss
invoke-thunderstruck
invoke-voicetroll
set-wallpaper
invoke-inveighrelay
invoke-psexec
invoke-sshcommand
get-securitypackages
install-ssp
invoke-backdoorlnk
powerbreach
get-sitelistpassword
get-system
invoke-bypassuac
invoke-tater
invoke-wscriptbypassuac
powerup
powerview
get-rickastley
find-fruit
http-login
find-trusteddocuments
invoke-paranoia
invoke-winenum
invoke-arpscan
invoke-portscan
invoke-reversednslookup
invoke-smbscanner
invoke-mimikittenz
invoke-allchecks
system.reflection.assembly.load
[system.reflection.assembly]::load
[reflection.assembly]::load
system.reflection.assemblyname
reflection.emit.assemblybuilderaccess
runtime.interopservices.dllimportattribute
suspendthread
dumpcreds
mimikatz
bloodhound
sharphound
del (get-psreadlineoption).historysavepath
set-psreadlineoption –historysavestyle savenothing
remove-item (get-psreadlineoption).historysavepath
rm (get-psreadlineoption).historysavepath
new-localuser
start-dnscat2
metasploit
kali
adjusttokenprivileges
image_nt_optional_hdr64_magic
microsoft.win32.unsafenativemethods
readprocessmemory.invoke
se_privilege_enabled
lsa_unicode_string
minidumpwritedump
page_execute_read
security_delegation
token_adjust_privileges
token_all_access
token_assign_primary
token_duplicate
token_elevation
token_impersonate
token_information_class
token_privileges
token_query
add-constraineddelegationbackdoor
set-dcshadowpermissions
dns_txt_pwnage
execute-ontime
http-backdoor
set-remotepsremoting
set-remotewmi
invoke-amsibypass
out-chm
out-hta
out-scf
out-sct
out-shortcut
out-webquery
out-word
enable-duplication
download-execute-ps
download_execute
execute-command-mssql
execute-dnstxt-code
out-rundllcommand
copy-vss
firebuster
firelistener
get-information
get-passhints
get-wlan-keys
get-web-credentials
invoke-credentialsphish
wdigest
invoke-ssidexfil
invoke-sessiongopher
keylogger
invoke-interceptor
create-multiplesessions
invoke-networkrelay
run-exeonremote
invoke-prasadhak
invoke-bruteforce
password-list
invoke-jsratregsvr
invoke-jsratrundll
invoke-poshrathttps
invoke-powershellicmp
invoke-powershelludp
invoke-psgcat
invoke-psgcatagent
remove-poshrat
add-persistance
exetotext
invoke-decode
invoke-encode
parse_keys
remove-persistence
stringtobase64
texttoexe
powerpreter
nishang
encodeddata
datatoencode
loggedkeys
out-dnstxt
jitter
exfiloption
tamper
dumpcerts
shellcode32
shellcode64
notallnamespaces
exfill
fakedc
exploit
ps attack!!!
system.net.webclient
.downloadfile(
-nop -w hidden -c * [convert]::frombase64string
-ep bypass
-w hidden
-enc
-encodedcommand
powershell.exe reg add hkcu\software\microsoft\windows\currentversion\run
bypass -noprofile -windowstyle hidden (new-object system.net.webclient).download
iex(new-object net.webclient).download
reg save hklm\system
reg save hklm\sam
reg save hklm\security
reg save hkey_local_machine\system
reg save hkey_local_machine\sam
reg save hkey_local_machine\security
reg export hklm\system
reg export hklm\sam
reg export hklm\security
reg export hkey_local_machine\system
reg export hkey_local_machine\sam
reg export hkey_local_machine\security
asreproast
dump /service:krbtgt
kerberoast
createnetonly /program:
ptt /ticket:
/impersonateuser:
renew /ticket:
asktgt /user:
harvest /interval:
createminidump.exe
procdump
psexec
psexesvc
paexec
sekurlsa
system.management.automation.amsiutils
-nop -sta -noni -w hidden -enc
-nop -sta -w 1 -enc
-nop -noni -w hidden -enc
-enc sqb
-nop -exec bypass -encodedcommand sqb
whoami
net user
sqlmap
dumped to csv file
administrator
krbtgt
dpapi_userkey
dpapi_machinekey
secretsdump
exploit
Rubeus
TargetDomainName
GPOChanges
KRBTGT
api_key
apikey
api-key
api-token
api_token
api-secret
api_secret
secret_key
secret-key
secret_token
0day
breach
exploit
magnet
phish
pw dump
pwn
hax
h4x
h4ck
h4x0r
hacking
cobaltstrike
beacon
aggressor
empire
msfconsole
meterpreter
cve
ransom
paypal
carding
T*kens
scam
.onion
tor
tox
shell
western union
sql
backdoor
dob
skimmer
fortinet
drugs
iptv
ip-tv
leaked
leak
dork