In the Fall of 2015 I decided to begin researching the flexibility of PowerShell's language and began cataloguing the various ways to accomplish a handful of common techniques that most attackers use ...
Not all applications are created with remote execution in mind. PowerShell provides several ways to invoke applications on ...