You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A curated list of powerful Windows commands for offensive security and digital forensics.
This cheat sheet focuses on password extraction, persistence techniques, system info, and traces left behind.
📋 Project Overview
This repository contains practical and field-tested Windows commands useful for Red Team operations, credential harvesting, live forensics, and post-exploitation.
Each command includes a short description, where to run it (CMD/PowerShell), and its relevance.
🛠️ Credential & Password Extraction
Command
Description
Where to Run
netsh wlan show profile name="Wi-Fi-Name" key=clear
Shows saved Wi-Fi password
CMD
rundll32.exe keymgr.dll,KRShowKeyMgr
Shows saved credentials (GUI window)
CMD
reg save HKLM\SAM sam && reg save HKLM\SYSTEM system
Dumps SAM + SYSTEM for hash extraction
CMD (as Admin)
whoami /priv
Shows available privileges (check for SeDebugPrivilege)
CMD
tasklist /V
View running processes with window titles
CMD
vaultcmd /listcreds
List stored credentials in Windows Vault
CMD
findstr /si password *.txt *.ini *.xml
Searches for password keywords in text/config files
Project by TomSec8
Feel free to contribute additional commands or tools via pull requests.
📜 License
This project is licensed under the MIT License – see the LICENSE file for details.
About
A curated list of powerful Windows commands for offensive security and digital forensics. This cheat sheet focuses on password extraction, persistence techniques, system info, and traces left behind.