powershell   17240

« earlier    

[SOLVED] powershell to install .exe and .msi package - Spiceworks
Start-Process -FilePath "$env:systemroot\system32\msiexec.exe" -ArgumentList "/i `"$msifile`" /n /passive /l:c:\temp\epson.driver.wrapper.log" -Wait -WorkingDirectory $CurrentLocation
command  line  PowerShell  install  msi  exe  silent  one  liner  arguments  escaped 
2 days ago by jgear
PowerShell eBooks
We're extremely fortunate to be able to offer a set of free e-books related to key PowerShell topics. Authored by community experts and curated by members of the community, these are updated pretty regularly - so it's worth checking back for new editions every few months.
posh  powershell  ebooks  via:cmiller 
3 days ago by p9g
Exploring PowerShell AMSI and Logging Evasion – MDSec
Before attempting to load a script, it has now become commonplace to run the following AMSI bypass:
But have you ever wondered just how this magic command goes about unhooking AMSI?
In this post, we will walk through just how this technique works under the hood, then we will look at a few alternate ways to unhook AMSI from PowerShell.
amsi  powershell  pentest 
5 days ago by whip_lash

« earlier    

related tags

1  2  365  _kolla  add  aes  agent  alternate  alternative  amsi  apt  arguments  audit  automate  autosize  back  batch  books  change  check  cleanup  cli  client  command-line  command  commands  credentials  cybersecurity  deep  delegate  depth  devops  dfir  dhcp  dig  display  dive  documentation  download  dword  ebooks  else  enum  enumerate  enumeration  escaped  exchangeo  exe  expanding  exploration  fileless  fl  format  framework  ft  git  github  graphviz  group  groupby  guide  hacking  how-to  how  if  in  install  internet  item  jquery  keepass  kevin  key  later  lesser  line  liner  list  login  macos  mailbox  maintenance  malware  management  markdown  marquette  memory  method  microsoft  module  msi  msiexec  networking  new  nintex  nline  object  office  one  onenote  output  package  part  password  pentest  pentesting  performance  pnp  policy  posh  privesc  privilegeescalation  property  psgraph  read  refer  reference  registry  remote  remove  script  scripting  scripts  secure  security  shared  shell  shellscript  silent  sofacy  software  some  ssh  stderr  stdout  storage-spaces  store  structure  syntax  sysadmin  table  through  tips  to  tools  toread  tricks  type  uninstall  update  used  user  utilities  validation  value  vscode  walk  web  windows  windows10  workflow  wrap  wsus  zones 

Copy this bookmark: