Gesamte Überschrift: Microsoft Windows PowerShell Remote Command Execution Exploit Kategorie: remote exploits Betriebssystem: windows This python script mints a .ps1 file with an exploitable semicolon condition that allows for command execution from Microsoft Windows PowerShell. This is an updated exploit to work with Python3. # 0day.today @ http://0day.today/