The Red Team Vade Mecum
Search…
⌃K
The Red Team Vade Mecum
Search…
⌃K
The Red Team Vade Mecum
Techniques
Defense Evasion
Privilege Escalation
Enumeration
Execution
Initial Access
Lateral Movement
Linux
No Admin?
Checking for access
Poison Handler
WinRM
AT
PsExec
WMI
Service Control
DCOM
RDP
SCShell
Code Injection
Persistence
Infrastructure
SQL
Other
Vulnerability Discovery
Windows Internals
Powered By GitBook

Poison Handler

This tool registers a protocol handler remotely, and invokes it by using "start handler://" to execute commands.
Execute-PoisonHandler -ComputerName <TARGET> -Payload "commands”
GitHub - Mr-Un1k0d3r/PoisonHandler: lateral movement techniques that can be used during red team exercises
GitHub
​
Previous
Checking for access
Next
WinRM
Last modified 1yr ago
Copy link