Explore tweets tagged as #PowerShell
Never underestimate a properly caffeinated user and a little PowerShell knowledge โ๐๐
96
269
9K
Day 99๐ Network Forensics Lab where I reconstructed a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics & IOCs. Almost ran the malware file on my laptop๐ญ#100DaysOfCyberSecurity
4
4
56
If you're looking for ideas for a useful (and maybe a little fancy) PowerShell profile, feel free to copy any or all of mine! It is now on my public PowerShell repository on GitHub. ๐งโ๐ป https://t.co/Vo78zgGcYN
0
1
6
While investigating NTUSER.DAT and SYSTEM registry hives, I uncovered malware persistence via obfuscated PowerShell in Run keys and a fake svchost.exe scheduled as a hidden task. YARA signatures identified the payload as a variant of AresLoader.
8
83
509
Normally I use patch_review.py for my monthly reporting on patch Tuesday patches. @KevTheHermit did an amazing job with it. But since I'm more of a PowerShell guy, I finally came around and moved the codebase to ps1. If you like #PowerShell feel free: https://t.co/nzJ0eP2ayC
7
87
309
ูููุฏูุฒ 10 ุจููุชูู ๐ฑ๐ฑ๐ฑ๐ฑ ุงูู
ูู
1- ู
ููุน https://t.co/zkJek0bP2X ู ุงูุณุฎ 2- ููู ูู
ูู ุนูู ุฒุฑ ุงููููุฏูุฒ ุจุดุฑูุท ุงูู
ูุงู
ุซู
Powershell Adminุ ููู ูู
ูู ููุตู ุงูุฑุงุจุท ุซู
ุชุทูุน ุตูุญุฉ cmd (ูุงุชุฎุงู)ุ ุงุถุบุท ุฑูู
3 ูู ุฐูู ุงูุตูุญุฉ 3-ุงุถุบุท ุฑูู
2 ุจุงูุตูุญุฉ ุงููู ุชุทูุน ุจุนุฏูุง 4-ู
ุจุฑูู ุนูุฏู ุงูุชุญุฏูุซุงุช
11
27
331
u would expect that from uninstalling an old app on windows that it would uninstall the entire thing but NOW you have to MANUALLY LOOK EVERWHERE TO UNINSTALL VOICEMEETER BUT YET YOU HAVE NO LUCK ON IT. I TRIED COMMAND PROMPT, POWERSHELL, UNINSTALLING IT VIA AUTORUN, NOTHING...
0
0
4
Copilot & SharePoint Magic with Org Asset Libraries! Copilot will query the organizational asset library for associated images if prompts include "brand" or "enterprise". #SharePoint #Copilot #organizationalassets #microsoft365 #powershell
1
3
12
Master PowerShell for full domain takeover! Learn AMSI bypass, Mimikatz credential dumping, privilege escalation with PowerUp, and NTDS extraction. https://t.co/HnaoSSMplq
@three_cube
0
42
167
New Post: The legendary @MrGranfeldt PowerShell Management Agent for Microsoft Identity Manager & Entra Provisioning Service ECMA On-Premise capability now supports PowerShell 7. https://t.co/UjRQgoGP5Y
0
0
0
PowerShell module for automating and customizing Windows settings
1
0
19
The system was infected by fileless malware leveraging wmic and reflective DLL injection. Malicious PowerShell ran entirely in memory, leaving no disk artifacts. Analysis of memory dumps revealed a hidden backdoor. Volatility confirmed injected threads and encoded PowerShell code
5
60
332
Gemini CLI is a game-changer. ๐ค It turns natural language into PowerShell commands, powered by AI. ๐ Automate security scans (SQLi, Pentest with Kali) ๐คBuild AI agents for research ๐จโ๐ปGenerate full web apps with a single command Just stop writing complex scripts ! #AI
1
0
4
Blog post: Unpacking the Microsoft #Intune MDM and Entra ID Certificate https://t.co/vVJJWc0QrW
#PowerShell
0
17
59
Powershell & WMI Abuse Day 9 of Cybersecurity Awareness Month link - https://t.co/xI9r7JKpHk
#cybersecurityawarenessmonth #senselearner
0
0
2
PowerShell 7 Support Arrives for the Granfeldt PowerShell Management Agent
0
0
0
Did you know, you can convert the Source of Authority of your Hybrid users to Microsoft Entra today? Here is how > https://t.co/ys1Xe5yrzSโญ Using PowerShell, you can set ๐ข๐ฌ๐๐ฅ๐จ๐ฎ๐๐๐๐ง๐๐ ๐๐ property on your user to ๐๐ซ๐ฎ๐, which enables you to fully manage your user
8
19
104
ThreatLabz discovered a multi-stage ClickFix campaign likely affiliated with the Russia-linked APT group COLDRIVER targeting members of Russian civil society. The campaign led to a new downloader, BAITSWITCH, & a new PowerShell-based backdoor, SIMPLEFIX. https://t.co/SauG1RQEui
1
31
90
PowerShell tools for applying and managing Windows security settings
1
26
148