I hereby claim:
- I am jaredcatkinson on github.
 - I am jaredcatkinson (https://keybase.io/jaredcatkinson) on keybase.
 - I have a public key whose fingerprint is E36F 8790 CAFF 1865 40C6 E2D5 2D79 10BE 8FC6 F83E
 
To claim this, I am signing this object:
| function Get-Hash | |
| { | |
| <# | |
| .SYNOPSIS | |
| Get-Hash is a PowerShell Version 2 port of Get-FileHash that supports hashing files, as well as, strings. | |
| .PARAMETER InputObject | |
| This is the actual item used to calculate the hash. This value will support [Byte[]] or [System.IO.Stream] objects. | 
| function Resolve-CommandLineToFilePath | |
| { | |
| <# | |
| .SYNOPSIS | |
| The Resolve-CommandLineToFilePath function takes an arbitrary Command Line and resolves the called application/file's path. | |
| .PARAMETER CommandLine | |
| The CommandLine that you want to convert to a file path. | 
| function Test-Condition | |
| { | |
| param | |
| ( | |
| [Parameter(Mandatory = $true)] | |
| [bool] | |
| $Result, | |
| [Parameter(Mandatory = $true)] | |
| [string] | 
| function Get-KerberosTicketGrantingTicket | |
| { | |
| <# | |
| .SYNOPSIS | |
| Gets the Kerberos Tickets Granting Tickets from all Logon Sessions | |
| .DESCRIPTION | |
| Get-KerberosTicketGrantingTicket uses the Local Security Authority (LSA) functions to enumerate Kerberos logon sessions and return their associate Kerberos Ticket Granting Tickets. | 
| function Get-AccessToken | |
| { | |
| param | |
| ( | |
| [Parameter()] | |
| [System.Diagnostics.Process[]] | |
| $Process | |
| ) | |
| begin | 
| function ConvertFrom-Base64 | |
| { | |
| param | |
| ( | |
| [Parameter(Mandatory = $true, ValueFromPipeline = $true)] | |
| [string] | |
| $Base64String | |
| ) | |
| $stringBytes = [System.Convert]::FromBase64String($Base64String) | 
| # This is really beta code used in my Detection Methodology post. I plan to write more efficient code when I get some more time. | |
| function Get-ExtendedAttribute | |
| { | |
| foreach($file in (Get-ChildItem -Path C:\ -Recurse)) | |
| { | |
| $obj = Get-ExtendedAttribute -FilePath $file.FullName | Where-Object {$_ -ne $null} | |
| $obj | Add-Member -MemberType NoteProperty -Name FileName -Value $file.FullName | |
| Write-Output $obj | |
| } | 
| function Get-StructureOffset | |
| { | |
| <# | |
| .SYNOPSIS | |
| Returns the field offset of the unmanaged form of the managed structure. | |
| .DESCRIPTION | |
| Wraps the Marshal class' OffsetOf method to return the offset for all fields in the specified Structure. | 
| function Get-InjectedThread | |
| { | |
| <# | |
| .SYNOPSIS | |
| Looks for threads that were created as a result of code injection. | |
| .DESCRIPTION | |
I hereby claim:
To claim this, I am signing this object: