I hereby claim:
- I am jaredcatkinson on github.
- I am jaredcatkinson (https://keybase.io/jaredcatkinson) on keybase.
- I have a public key whose fingerprint is E36F 8790 CAFF 1865 40C6 E2D5 2D79 10BE 8FC6 F83E
To claim this, I am signing this object:
function Get-Hash | |
{ | |
<# | |
.SYNOPSIS | |
Get-Hash is a PowerShell Version 2 port of Get-FileHash that supports hashing files, as well as, strings. | |
.PARAMETER InputObject | |
This is the actual item used to calculate the hash. This value will support [Byte[]] or [System.IO.Stream] objects. |
function Resolve-CommandLineToFilePath | |
{ | |
<# | |
.SYNOPSIS | |
The Resolve-CommandLineToFilePath function takes an arbitrary Command Line and resolves the called application/file's path. | |
.PARAMETER CommandLine | |
The CommandLine that you want to convert to a file path. |
function Test-Condition | |
{ | |
param | |
( | |
[Parameter(Mandatory = $true)] | |
[bool] | |
$Result, | |
[Parameter(Mandatory = $true)] | |
[string] |
function Get-KerberosTicketGrantingTicket | |
{ | |
<# | |
.SYNOPSIS | |
Gets the Kerberos Tickets Granting Tickets from all Logon Sessions | |
.DESCRIPTION | |
Get-KerberosTicketGrantingTicket uses the Local Security Authority (LSA) functions to enumerate Kerberos logon sessions and return their associate Kerberos Ticket Granting Tickets. |
function Get-AccessToken | |
{ | |
param | |
( | |
[Parameter()] | |
[System.Diagnostics.Process[]] | |
$Process | |
) | |
begin |
function ConvertFrom-Base64 | |
{ | |
param | |
( | |
[Parameter(Mandatory = $true, ValueFromPipeline = $true)] | |
[string] | |
$Base64String | |
) | |
$stringBytes = [System.Convert]::FromBase64String($Base64String) |
# This is really beta code used in my Detection Methodology post. I plan to write more efficient code when I get some more time. | |
function Get-ExtendedAttribute | |
{ | |
foreach($file in (Get-ChildItem -Path C:\ -Recurse)) | |
{ | |
$obj = Get-ExtendedAttribute -FilePath $file.FullName | Where-Object {$_ -ne $null} | |
$obj | Add-Member -MemberType NoteProperty -Name FileName -Value $file.FullName | |
Write-Output $obj | |
} |
function Get-StructureOffset | |
{ | |
<# | |
.SYNOPSIS | |
Returns the field offset of the unmanaged form of the managed structure. | |
.DESCRIPTION | |
Wraps the Marshal class' OffsetOf method to return the offset for all fields in the specified Structure. |
function Get-InjectedThread | |
{ | |
<# | |
.SYNOPSIS | |
Looks for threads that were created as a result of code injection. | |
.DESCRIPTION | |
I hereby claim:
To claim this, I am signing this object: