Abusing Accessibility Features as a persistence mechanism.
Category: lolbins
Post-Exploitation With gawk
Some post exploitation techniques using gawk.

REVIEW: RED TEAM Operator: Windows Persistence Course by SEKTOR7 Institute
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
Using finger.exe to Transfer Files
Abusing finger.exe to send data over the network
Windows base64 Encoding and Decoding Using certutil
Use certutil.exe to encode and decode base64 on Windows.