Open Source PowerShell-Written Post Exploitation FrameworksNelson, T., & Kettani, H. (2020). Open source powershell-written post exploitation frameworks used by cyber espionage groups. 2020 3rd International Conference on Information and Computer Technologies (ICICT), Information and Computer Technologies (ICICT), 451–456.
The author offers an in-depth analysis of PowerShell’s written exploits used in espionage.