By the end of this module, you should have a better understanding of:
β PowerShell tools we can leverage for penetration testing.
β Expanding the use of PowerShell for offensive purposes.
Last updated 5 years ago