Difference between revisions of "PowerShell"

From ForensicsWiki
Jump to: navigation, search
(External Links)
(External Links)
 
Line 9: Line 9:
 
=== Exploitation ===
 
=== Exploitation ===
 
* [http://www.powershellempire.com/ empire], post-exploitation agent built in PowerShell.
 
* [http://www.powershellempire.com/ empire], post-exploitation agent built in PowerShell.
 +
* [http://www.asd.gov.au/publications/protect/Securing_PowerShell.pdf Securing PowerShell in the Enterprise], by Australian Cyber Security Centre, March 2016

Latest revision as of 06:26, 24 May 2016

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

See Also

External Links

Exploitation