Full title: Microsoft Windows PowerShell Remote Command Execution Exploit Category: remote exploits Platform: windows This python script mints a .ps1 file with an exploitable semicolon condition that allows for command execution from Microsoft Windows PowerShell. This is an updated exploit to work with Python3. # 0day.today @ http://0day.today/