From 7166a8f52991d4649318bc04633c6b571319f32e Mon Sep 17 00:00:00 2001 From: Eric Conrad Date: Sat, 4 May 2019 12:04:35 -0300 Subject: [PATCH] Updated links --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index ea601c4..8ce2cc3 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,7 @@ Eric Conrad, Backshore Communications, LLC deepblue `at` backshore `dot` net -Twitter: @eric_conrad +Twitter: [@eric_conrad](https://twitter.com/eric_conrad) http://ericconrad.com @@ -36,7 +36,7 @@ This command will bypass Set-Execution entirely: `Set-ExecutionPolicy Bypass` See `get-help Set-ExecutionPolicy` for more options. -Please note that "Set-ExecutionPolicy is not a security control" (quoting [@Ben0xA](https://twitter.com/ben0xa) +Please note that "Set-ExecutionPolicy is not a security control" (quoting [@Ben0xA](https://twitter.com/ben0xa)) ### Process local Windows security event log (PowerShell must be run as Administrator): @@ -166,7 +166,7 @@ See the following for more information: - https://logrhythm.com/blog/powershell-command-line-logging/ - http://hackerhurricane.blogspot.com/2014/11/i-powershell-logging-what-everyone.html -Thank you: @heinzarelli and @HackerHurricane +Thank you: [@heinzarelli](https://twitter.com/heinzarelli) and [@HackerHurricane](https://twitter.com/hackerhurricane) ### Sysmon