by Frank Ully
This is the third article in a multi-part series about Windows PowerShell and how attackers abuse it, how incident responders can detect these attacks – and how IT security managers can prevent them in the first place. This article introduces publicly available script collections with offensive PowerShell scripts for post-exploitation. [read the German article]