<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>powershell</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/685/feed"/>
    <updated>2026-04-22T07:24:13+00:00</updated>
    <id>https://links.biapy.com/guest/tags/685/feed</id>
            <entry>
            <id>https://links.biapy.com/links/12439</id>
            <title type="text"><![CDATA[Google Drive Shortcuts Exporter]]></title>
            <link rel="alternate" href="https://github.com/codename5281/Export-GoogleShortcuts" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12439"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Batch convert local Google Drive shortcuts (.gdoc, .gsheet, .gslides) into real Office files (.docx, .xlsx, .pptx) directly within your folder structure.

Related contents:

- [Dégooglisation - Vos Google Docs ne sont pas de vrais fichiers @ Korben :fr:](https://korben.info/degooglisation-export-google-docs-office.html).]]>
            </summary>
            <updated>2026-04-07T06:51:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/570</id>
            <title type="text"><![CDATA[SpeculationControl]]></title>
            <link rel="alternate" href="https://github.com/Microsoft/SpeculationControl" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/570"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown).

Related contents:

- [SpeculationControl - Un module PowerShell anti-Spectre / Meltdown @ Korben :fr:](https://korben.info/speculationcontrol-module-powershell-spectre-meltdown.html).]]>
            </summary>
            <updated>2025-08-28T17:34:02+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1165</id>
            <title type="text"><![CDATA[MemProcFS-Analyzer]]></title>
            <link rel="alternate" href="https://github.com/LETHAL-FORENSICS/MemProcFS-Analyzer" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1165"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automated Forensic Analysis of Windows Memory Dumps for DFIR.

MemProcFS-Analyzer.ps1 is a PowerShell script utilized to simplify the usage of MemProcFS and to optimize your memory analysis workflow.]]>
            </summary>
            <updated>2025-08-28T19:10:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1519</id>
            <title type="text"><![CDATA[Hawk]]></title>
            <link rel="alternate" href="https://github.com/T0pCyber/hawk" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1519"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Powershell Based tool for gathering information related to O365 intrusions and potential Breaches]]>
            </summary>
            <updated>2025-08-28T20:09:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1545</id>
            <title type="text"><![CDATA[AADInternals.com]]></title>
            <link rel="alternate" href="https://aadinternals.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1545"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AADInternals is PowerShell module for administering Azure AD and Office 365.

- [AADInternals @ GitHub](https://github.com/Gerenios/AADInternals).
- [AADInternals documentation](https://aadinternals.com/aadinternals/).]]>
            </summary>
            <updated>2025-08-28T20:13:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1775</id>
            <title type="text"><![CDATA[PowerShell-Hunter]]></title>
            <link rel="alternate" href="https://github.com/MHaggis/PowerShell-Hunter/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1775"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerShell-Hunter is a growing collection of PowerShell-based threat hunting tools designed to help defenders investigate and detect malicious activity in Windows environments. This project aims to provide security analysts with powerful, flexible tools that leverage PowerShell&amp;#039;s native capabilities for threat hunting.

Related contents:

- [⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips \[27 January\] @ Cybersecurity Newsletters&amp;#039; LinkedIn](https://www.linkedin.com/pulse/thn-weekly-recap-top-cybersecurity-threats-tools-tips-27-d6olc/).]]>
            </summary>
            <updated>2025-08-28T20:51:55+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2144</id>
            <title type="text"><![CDATA[Microsoft Graph SDK]]></title>
            <link rel="alternate" href="https://learn.microsoft.com/en-us/graph/sdks/sdks-overview" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2144"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Microsoft Graph software development kits (SDKs) are designed to simplify building high-quality, efficient, resilient applications that access Microsoft Graph. The SDKs include two components: a service library and a core library.

The service library contains models and request builders generated from Microsoft Graph metadata. The service library provides a rich, strongly-typed, and discoverable experience when working with the many datasets available in Microsoft Graph.

- [Microsoft Graph SDK for PHP @ GitHub](https://github.com/microsoftgraph/msgraph-sdk-php).]]>
            </summary>
            <updated>2025-08-28T21:53:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2191</id>
            <title type="text"><![CDATA[GPOZaurr]]></title>
            <link rel="alternate" href="https://github.com/EvotecIT/GPOZaurr" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2191"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[GPOZaurr is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them. GPOZaurr provides 360 degrees of information about Group Policies and their settings.]]>
            </summary>
            <updated>2025-08-28T22:01:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2306</id>
            <title type="text"><![CDATA[command-not-found feedback provider plugin for PowerShell]]></title>
            <link rel="alternate" href="https://github.com/PowerShell/command-not-found" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2306"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The command-not-found module is a feedback provider plugin for PowerShell. This feedback provider depends on the command-not-found utility, which is often available on Linux by default, to provide suggestions when a native command cannot be found.

bash also calls the command-not-found utility to provide suggestions when a command cannot be found. But this feedback provider plugin does more than that, thanks to the command-line predictor feature in PowerShell. It also implements the ICommandPredictor interface and serves as a predictor. When the resulted feedback contains actionable items, such as commands to run, they will be used as predictive suggestions to streamline the user&amp;#039;s command-line experience.]]>
            </summary>
            <updated>2025-08-28T22:20:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2376</id>
            <title type="text"><![CDATA[ADRecon]]></title>
            <link rel="alternate" href="https://github.com/adrecon/ADRecon" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2376"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

- [ADRecon, un outil en PowerShell pour collecter des informations sur l’Active Directory @ IT-Connect :fr:](https://www.it-connect.fr/decouverte-reconnaissance-active-directory-adrecon/).]]>
            </summary>
            <updated>2025-08-28T22:32:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3067</id>
            <title type="text"><![CDATA[ADSpider]]></title>
            <link rel="alternate" href="https://github.com/DrunkF0x/ADSpider" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3067"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Monitor changes in Active Directory with replication metadata.

Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number (USN) to filter current properties of objects.

- [🛠ADSpider - Monitor changes in Active Directory with replication metadata @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-activedirectory-activity-7256926504373075968-fW5J/).]]>
            </summary>
            <updated>2025-08-29T00:28:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3157</id>
            <title type="text"><![CDATA[cli-ai]]></title>
            <link rel="alternate" href="https://github.com/fmdz387/cli-ai" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3157"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🤖 CLI AI Assistant

A simple command-line AI assistant that translates natural language into shell commands. Supports all Windows and Unix-based systems (Linux, MacOS). 

- [Episode 585 - Choosy Moms Choose Ubuntu @ Linux Unplugged](https://linuxunplugged.com/585).]]>
            </summary>
            <updated>2025-08-29T00:42:37+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3256</id>
            <title type="text"><![CDATA[AsBuiltReport]]></title>
            <link rel="alternate" href="https://www.asbuiltreport.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3256"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Document Your Datacenter With PowerShell.

As Built Report is an open source configuration document framework which utilises Microsoft PowerShell to produce as-built documentation in multiple document formats for multiple vendors and technologies. The framework allows users to easily generate clear and consistent documentation, for any environment which supports Microsoft PowerShell and/or a RESTful API.

- [AsBuiltReport.Core @ GitHub](https://github.com/AsBuiltReport/AsBuiltReport.Core).
- [Microsoft AD As Built Report @ GitHub](https://github.com/AsBuiltReport/AsBuiltReport.Microsoft.AD).
- [HomeLab: Active Directory Documentation using AsBuiltReport @ TechMyth](https://techmyth.blog/posts/homelab-ad-doc-using-asbuiltreport/).]]>
            </summary>
            <updated>2025-08-29T01:00:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3540</id>
            <title type="text"><![CDATA[CleanupMonster]]></title>
            <link rel="alternate" href="https://github.com/EvotecIT/CleanupMonster" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3540"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This module provides an easy way to cleanup Active Directory from dead/old objects based on various criteria. It can also disable, move or delete objects. It can utilize Azure AD, Intune and Jamf to get additional information about objects before deleting them. 

CleanupMonster is a PowerShell module to that helps you clean up Active Directory. It&amp;#039;s a complete solution that allows you to remove stale Computer (Users will be added in future) objects from Active Directory. It&amp;#039;s a very advanced module with many options and you can easily customize it to your needs. Please make sure to run this module with proper permissions or you may get wrong results. By default Active Directory domain allows a standard user to read LastLogonDate and LastPasswordSet attributes. If you have changed those settings you may need to run the module with elevated permissions even for reporting needs.

# Related contents

- [Ordinateurs inactifs : comment nettoyer l’Active Directory avec CleanupMonster ? @ IT Connect :fr:](https://www.it-connect.fr/ordinateurs-inactifs-nettoyer-active-directory-avec-cleanupmonster/).]]>
            </summary>
            <updated>2025-08-29T01:46:11+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3661</id>
            <title type="text"><![CDATA[Maester]]></title>
            <link rel="alternate" href="https://maester.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3661"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Microsoft Security test automation framework!

Monitor your Microsoft 365 tenant&amp;#039;s security configuration using Maester!

Maester is an open source PowerShell-based test automation framework designed to help you monitor and maintain the security configuration of your Microsoft 365 environment.

- [Maester @ GitHub](https://github.com/maester365/maester).
- [Maester, l’outil pour automatiser vos tests de sécurité Microsoft 365 @ IT Connect :fr:](https://www.it-connect.fr/maester-automatiser-tests-de-securite-microsoft-365/).]]>
            </summary>
            <updated>2025-08-29T02:07:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3869</id>
            <title type="text"><![CDATA[Arcane]]></title>
            <link rel="alternate" href="https://github.com/PhrozenIO/Arcane" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3869"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a cross-platform client (Python/QT6). 

Arcane, previously known as PowerRemoteDesktop, is a remote desktop application distinguished by its server being entirely written in PowerShell.

The server is implemented as a single PowerShell script that can also be used as a module that can be run on any Windows machine with PowerShell 5.1 or later (higher versions are recommended for better performance). It has been tested on Windows 10 (both x86-32 and x86-64 architectures) and Windows 11 x86-32, x86-64 and ARM64.]]>
            </summary>
            <updated>2025-08-29T02:41:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4199</id>
            <title type="text"><![CDATA[VirtualGHOST]]></title>
            <link rel="alternate" href="https://github.com/CrowdStrike/VirtualGHOST" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4199"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[VirtualGHOST Detection Tool

This repository contains a PowerShell script leveraging VMWare PowerCLI to identify unregistered VMWare Virtual Machines (VMs) that are powered on by comparing the list of VMs registered in the inventory (vCenter or ESXi) vs. those that are powered on.

- [VirtualGHOST : détectez les machines virtuelles cachées par les attaquants sur VMware ESXi @ IT-Connect :fr:](https://www.it-connect.fr/virtualghost-detecter-machines-virtuelles-cachees-sur-vmware-esxi/).]]>
            </summary>
            <updated>2025-08-29T03:36:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4378</id>
            <title type="text"><![CDATA[PassTester]]></title>
            <link rel="alternate" href="https://github.com/Elymaro/PassTester" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4378"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Identify the accounts most vulnerable to dictionary attacks.

PassTester is a tool for finding user passwords that are most vulnerable to dictionary attacks. The aim is to prompt the users concerned to choose a more secure password.

- [Comment peut-on évaluer la résistance des mots de passe utilisateurs aux attaques par dictionnaire lors d&amp;#039;un audit de sécurité ? @ Aurélien BOURDOIS&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/aurelien-bourdois_passtester-comment-peut-on-%C3%A9valuer-activity-7181334173679243265-G6bJ/).]]>
            </summary>
            <updated>2025-08-29T04:06:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4486</id>
            <title type="text"><![CDATA[Harden]]></title>
            <link rel="alternate" href="https://hardenad.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4486"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure infrastructure in minutes. Hardening Active Directory and Office 365.

- [Harden @ GitHub](https://github.com/LoicVeirman/HardenAD).
- [Hardening AD : Sécuriser vos infrastructures avec HardenAD @ Hamza Kondah&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/events/7132717233872474112/comments/).
- [bonnes pratiques en termes de configurations et durcissements autour de l&amp;#039;Active Directory @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_github-cybersecurity-activedirectory-activity-7170309659516481536-Pw1g).]]>
            </summary>
            <updated>2025-08-29T04:24:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4548</id>
            <title type="text"><![CDATA[Under the Wire]]></title>
            <link rel="alternate" href="https://underthewire.tech/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4548"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerShell Training for the People.

Under the Wire trains experienced, developing, and novice Information Technologists to use Windows PowerShell in a variety of situations through innovative and fun wargames.

- [Under The Wire, un wargame pour apprendre PowerShell @ IT-Connect :fr:](https://www.it-connect.fr/under-the-wire-un-wargame-pour-apprendre-powershell/).]]>
            </summary>
            <updated>2025-08-29T04:34:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4569</id>
            <title type="text"><![CDATA[Pester]]></title>
            <link rel="alternate" href="https://pester.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4569"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The ubiquitous test and mock framework for PowerShell.

- [Pester @ GitHub](https://github.com/pester/pester).]]>
            </summary>
            <updated>2025-08-29T04:38:44+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4570</id>
            <title type="text"><![CDATA[PSKoans]]></title>
            <link rel="alternate" href="https://github.com/vexx32/PSKoans" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4570"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A simple, fun, and interactive way to learn the PowerShell language through Pester unit testing. 

Inspired by Chris Marinos&amp;#039; fantastic F# koans, the goal of the PowerShell koans is to teach you PowerShell by presenting you with a set of questions. Each kōan (each question) is represented by a failing Pester test. Your goal is to make those tests pass by filling out the correct answer, or writing the correct code. The koans start very simple to get you familiar with the basic concepts and progress towards more difficult. Teaching you multiple beginner, intermediate and advanced aspects of PowerShell in the process.

- [Comment apprendre et progresser en PowerShell à l’aide de PSKoans ? @ IT-Connect :fr:](https://www.it-connect.fr/comment-apprendre-powershell-aide-de-pskoans/).]]>
            </summary>
            <updated>2025-08-29T04:38:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4735</id>
            <title type="text"><![CDATA[Forensic Miner]]></title>
            <link rel="alternate" href="https://github.com/YosfanEilay/ForensicMiner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4735"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.

ForensicMiner, a PowerShell-based DFIR automation tool, revolutionizes the field of digital investigations. Designed for efficiency, it automates artifact and evidence collection from Windows machines. Compatibility with Flacon Crowdstrike RTR and Palo Alto Cortex XDR Live Terminal, along with its swift performance and user-friendly interface, makes ForensicMiner an indispensable asset for investigators navigating the complexities of forensic analysis. Streamlined and effective, this tool sets a new standard in the realm of digital forensics.]]>
            </summary>
            <updated>2025-08-29T05:06:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4860</id>
            <title type="text"><![CDATA[SelfX]]></title>
            <link rel="alternate" href="https://www.systanddeploy.com/2022/08/selfx-tool-allowing-users-to-solve.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4860"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[(Self fix): a tool allowing users to solve their issues themselves and reduce tickets/calls to your support team.

- [SelfX @ GitHub](https://github.com/damienvanrobaeys/SelfX).
- [Avec SelfX, permettez aux utilisateurs de résoudre eux-mêmes les problèmes simples @ IT-Connect.fr (fr)](https://www.it-connect.fr/avec-selfx-permettez-aux-utilisateurs-de-resoudre-eux-memes-les-problemes-simples/).]]>
            </summary>
            <updated>2025-08-29T05:27:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5005</id>
            <title type="text"><![CDATA[PowerHuntShares]]></title>
            <link rel="alternate" href="https://github.com/NetSPI/PowerHuntShares" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5005"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains. 

PowerHuntShares is PowerShell tool designed to help cybersecurity teams
and penetration testers better identify, understand, attack,
and remediate SMB shares in the Active Directory environments they protect.

Sources:

- [Qui n&amp;#039;a jamais galéré dans son infrastructure AD pour retrouver les partages SMB ouverts ? @ Kondah Hamza&amp;#039;s X :fr:](https://x.com/kondah_ha/status/1810407641203835146).
- [PowerHuntShares : Analysez facilement les partages réseau de votre domaine Active Directory @ IT-Connect :fr:](https://www.it-connect.fr/powerhuntshares-analysez-facilement-les-partages-reseau-de-votre-domaine-active-directory/).]]>
            </summary>
            <updated>2025-08-29T05:51:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5008</id>
            <title type="text"><![CDATA[PersistenceSniper]]></title>
            <link rel="alternate" href="https://github.com/last-byte/PersistenceSniper" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5008"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PersistenceSniper is a Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. It is also available on Powershell Gallery and it is digitally signed with a valid code signing certificate. The tool is under active development with new releases coming out by the week, so make sure to use the up-to-date version. Official Twitter/X account @PersistSniper.]]>
            </summary>
            <updated>2025-08-29T05:51:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5247</id>
            <title type="text"><![CDATA[PowerLessShell]]></title>
            <link rel="alternate" href="https://github.com/Mr-Un1k0d3r/PowerLessShell" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5247"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.]]>
            </summary>
            <updated>2025-08-29T06:31:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6036</id>
            <title type="text"><![CDATA[DFIR4vSphere]]></title>
            <link rel="alternate" href="https://github.com/ANSSI-FR/DFIR4vSphere" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6036"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Powershell module for VMWare vSphere forensics.
The DFIR4vSphere PowerShell module collects logs and forensics artefacts on both ESXi hosts and the vCenter console.]]>
            </summary>
            <updated>2025-08-29T08:42:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8419</id>
            <title type="text"><![CDATA[Gargl]]></title>
            <link rel="alternate" href="http://jodoglevy.com/jobloglevy/?p=5" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8419"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Create an API for any website, in any programming language, without writing a line of code]]>
            </summary>
            <updated>2025-08-29T15:20:41+00:00</updated>
        </entry>
    </feed>
