Hunting and Gathering with PowerShell

PowerShell has been used extensively over the years by both malware authors and information security professionals to carry out disparate objectives. This paper will focus on the latter by detailing various techniques and use-cases for digital defenders. There is no one-size fits all model that...
By
Troy Wojewoda
March 13, 2019

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg