Updated links

This commit is contained in:
Eric Conrad
2019-05-04 12:04:35 -03:00
committed by GitHub
parent 4572c78387
commit 7166a8f529

View File

@ -6,7 +6,7 @@ Eric Conrad, Backshore Communications, LLC
deepblue `at` backshore `dot` net
Twitter: @eric_conrad
Twitter: [@eric_conrad](https://twitter.com/eric_conrad)
http://ericconrad.com
@ -36,7 +36,7 @@ This command will bypass Set-Execution entirely: `Set-ExecutionPolicy Bypass`
See `get-help Set-ExecutionPolicy` for more options.
Please note that "Set-ExecutionPolicy is not a security control" (quoting [@Ben0xA](https://twitter.com/ben0xa)
Please note that "Set-ExecutionPolicy is not a security control" (quoting [@Ben0xA](https://twitter.com/ben0xa))
### Process local Windows security event log (PowerShell must be run as Administrator):
@ -166,7 +166,7 @@ See the following for more information:
- https://logrhythm.com/blog/powershell-command-line-logging/
- http://hackerhurricane.blogspot.com/2014/11/i-powershell-logging-what-everyone.html
Thank you: @heinzarelli and @HackerHurricane
Thank you: [@heinzarelli](https://twitter.com/heinzarelli) and [@HackerHurricane](https://twitter.com/hackerhurricane)
### Sysmon