HTWMCL - How To Write My Command Linehttps://www.htwmcl.frLatest tools and command lines added to HTWMCL - pentest cheatsheet by g0h4n.en-ushttps://www.htwmcl.fr/assets/img/htwmcl_icon.pngHTWMCLhttps://www.htwmcl.frduhttps://www.htwmcl.fr/#duhttps://www.htwmcl.fr/#duDisplays all folders with their size in the specified directory max-depth indicates the number of recursions.lshttps://www.htwmcl.fr/#lshttps://www.htwmcl.fr/#lsDisplays all (files folders even hidden) contained in the specified directory. -force to view the hidden folders and files in powershellrpcclienthttps://www.htwmcl.fr/#rpcclienthttps://www.htwmcl.fr/#rpcclientIt is a utility developed to test the functionality of MS-RPC in Samba itself. To manage Windows (Server) NT clients from UNIX.libreofficehttps://www.htwmcl.fr/#libreofficehttps://www.htwmcl.fr/#libreofficeCommand line to export PDF file to DOC file (editable).nmaphttps://www.htwmcl.fr/#nmaphttps://www.htwmcl.fr/#nmapThis command scan the specified host to open ports and services running on them and to log all in the result file.sshttps://www.htwmcl.fr/#sshttps://www.htwmcl.fr/#ssThe command list all the connections present on the system. #netstat #sscrackmapexechttps://www.htwmcl.fr/#crackmapexechttps://www.htwmcl.fr/#crackmapexecIt is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of 'Living off the Land': abusing built-in Active Directory features/protocols to achieve it's functionality and allowing it to evade most endpoint protection/IDS/IPS solutions. #Enum #Passwordsmitm6https://www.htwmcl.fr/#mitm6https://www.htwmcl.fr/#mitm6It is a pentesting tool that exploits the default configuration of Windows to take over the default DNS server. It does this by replying to DHCPv6 messages, providing victims with a link-local IPv6 address and setting the attackers host as default DNS server. As DNS server, mitm6 will selectively reply to DNS queries of the attackers choosing and redirect the victims traffic to the attacker machine instead of the legitimate server.PowerSploithttps://www.htwmcl.fr/#PowerSploithttps://www.htwmcl.fr/#PowerSploitPowerView is a PowerShell tool to gain network situational awareness on Windows domains. It contains a set of pure-PowerShell replacements for various windows 'net *' commands, which utilize PowerShell AD hooks and underlying Win32 API functions to perform useful Windows domain functionality.kerbrutehttps://www.htwmcl.fr/#kerbrutehttps://www.htwmcl.fr/#kerbruteThis tool is designed to assist in quickly bruteforcing valid Active Directory accounts through Kerberos Pre-Authentication. It is designed to be used on an internal Windows domain with access to one of the Domain Controllers. Warning failed Kerberos Pre-Auth counts as a failed login and WILL lock out accounts.