Explore >> Select a destination


You are here

wezard4u.tistory.com
| | www.darkoperator.com
9.3 parsecs away

Travel
| | [AI summary] The provided text discusses various methods to secure PowerShell environments against potential threats, focusing on monitoring, logging, and policy enforcement. It outlines the use of Group Policy to enable module logging, which helps track PowerShell cmdlet activities. The text also covers the use of Software Restriction Policies (SRP) and AppLocker for controlling application execution. Additionally, it mentions the PowerShell v3 feature __PSLockdownPolicy as a tool for restricting PowerShell functionalities. The author emphasizes the importance of planning and testing these security measures in a controlled environment to ensure effectiveness.
| | perl-users.jp
7.3 parsecs away

Travel
| | [AI summary] A technical tutorial explains PowerShell evasion techniques using eval(), Invoke-Expression, and obfuscated character arithmetic to bypass anti-eval measures.
| | 4bes.nl
7.3 parsecs away

Travel
| | I have published a script to the PowerShell gallery that can check for PowerShell updates and install them. Put it in a scheduled task!
| | blog.aymenhamza.com
23.4 parsecs away

Travel
| Welcome to my developer blog! I'm a software developer with a passion for creating and building things. On this blog, I'll be sharing my thoughts, experiences, and insights on all things development. Whether you're just starting out in the field or you're a seasoned pro, I hope you'll find something