Post-Exploitation Enumeration

Windows

Don't forget to set the Execution Policy! Set-ExecutionPolicy Bypass -Scope process -Force

Automated

Manual

Linux

Automated

Manual


Relevant Note(s): Penetration Testing Anti-Virus Evasion Techniques