source stringclasses 1
value | repo stringclasses 33
values | repo_url stringclasses 33
values | path stringlengths 7 179 | language stringclasses 1
value | license stringclasses 4
values | stars int64 2.27k 53.4k | ref stringclasses 4
values | size_bytes int64 48 259k | text stringlengths 48 259k |
|---|---|---|---|---|---|---|---|---|---|
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/core/WinApi.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 16,079 | $FunctionDefinitions = @(
(New-Function advapi32 OpenSCManager ([IntPtr]) @([String], [String], [UInt32]) ([Runtime.InteropServices.CallingConvention]::Winapi) ([Runtime.InteropServices.CharSet]::Unicode) -SetLastError -EntryPoint OpenSCManager),
(New-Function advapi32 OpenService ([IntPtr]) @([IntPtr], [String... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/core/WinApi.Wrappers.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 116,960 | function Format-Error {
<#
.SYNOPSIS
Helper - Format a Windows standard error message.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
This cmdlet returns a formatted error message given a standard Windows error code.
.PARAMETER Code
A mandatory standard Windows error code.
... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/core/WinApi.Enum.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 31,903 | $script:SeverityLevel = New-Enum $Module WinApiModule.SeverityLevel UInt32 @{
None = 0
Low = 1
Medium = 2
High = 3
}
$script:SystemErrorCode = New-Enum $Module WinApiModule.SystemE... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/core/Reflection.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 21,614 | function New-DynamicModule {
<#
.SYNOPSIS
Short description
.DESCRIPTION
Long description
.PARAMETER ModuleName
Parameter description
.EXAMPLE
An example
.NOTES
https://github.com/jborean93/PowerShell-AnsibleVault/blob/master/AnsibleVault/Private/Invoke-Win32Api.ps1
#... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Hardening.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 64,474 | function Invoke-UserAccountControlCheck {
<#
.SYNOPSIS
Checks whether UAC (User Access Control) is enabled
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
The state of UAC can be determined based on the value of the parameter "EnableLUA" in the following registry key:
HKLM\Software\M... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/User.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 13,404 | function Invoke-UserCheck {
<#
.SYNOPSIS
Get various information about the current user.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
Get various information about the current user.
.EXAMPLE
PS C:\> Invoke-UserCheck
Name : DESKTOP-AAAAAAAA\Lab-User
SID ... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Misc.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 55,817 | function Invoke-SystemInformationCheck {
<#
.SYNOPSIS
Gets the name of the operating system and the full version string.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
Reads the "Product Name" from the registry and gets the full version string based on the operating system.
.EXAMPL... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Globals.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 1,230 | $script:GlobalVariable = @{
CheckResultList = $null
}
$script:GlobalCache = @{
CurrentUserSids = $null
CurrentUserDenySids = $null
DriverList = $null
InstalledApplicationList = $null
RegisteredComList = $null
ServiceList = $null
Schedu... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Updates.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 7,895 | function Invoke-WindowsUpdateCheck {
<#
.SYNOPSIS
Gets the last update time of the machine.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
The Windows Update status can be queried thanks to the Microsoft.Update.AutoUpdate COM object. It gives the last successful search time and the last... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Applications.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 18,025 | function Invoke-InstalledApplicationCheck {
<#
.SYNOPSIS
Get information about Microsoft applications installed on the machine by searching the registry and the default install locations.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
Uses the custom "Get-InstalledApplication" function ... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/ScheduledTasks.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 13,028 | function Invoke-ScheduledTaskImagePermissionCheck {
<#
.SYNOPSIS
Enumerates scheduled tasks with a modifiable path
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
This function enumerates all the scheduled tasks which are visible by the current user but are not owned by the current user.... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Credentials.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 44,112 | function Invoke-WinLogonCredentialCheck {
<#
.SYNOPSIS
Checks credentials stored in the Winlogon registry key
Author: @itm4n, @nurfed1
License: BSD 3-Clause
.DESCRIPTION
Windows has a registry setting to enable automatic logon. You can set a username and a password in order to automaticall... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Services.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 29,018 | function Invoke-InstalledServiceCheck {
<#
.SYNOPSIS
Enumerates non-default services
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
It uses the custom "Get-ServiceFromRegistry" function to get a filtered list of services that are configured on the local machine. Then it returns each res... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Main.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 27,556 | function Invoke-PrivescCheck {
<#
.SYNOPSIS
Enumerates common security misconfigurations that can be exploited for privilege escalation purposes.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
This script aims to identify security misconfigurations that are relevant for privilege escala... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Configuration.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 81,601 | function Invoke-RegistryAlwaysInstallElevatedCheck {
<#
.SYNOPSIS
Checks whether the AlwaysInstallElevated key is set in the registry.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
AlwaysInstallElevated can be configured in both HKLM and HKCU. "If the AlwaysInstallElevated value is not... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/check/Network.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 18,468 | function Invoke-NetworkAdapterCheck {
<#
.SYNOPSIS
Collect detailed information about all Ethernet and Wi-Fi network adapters.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
Collect detailed information about all active Ethernet adapters.
.EXAMPLE
PS C:\> Invoke-NetworkAdapterC... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/Cache.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 1,820 | function Test-CachedData {
[OutputType([Bool])]
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[String] $Name
)
$CacheEntryFound = $false
foreach ($CacheEntryName in $script:GlobalCache.Keys) {
if ($CacheEntryName -eq $Name) {
return $null -ne $sc... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/SystemConfiguration.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 91,106 | function Get-WindowsDefenderExclusion {
<#
.SYNOPSIS
Helper - Enumerate Windows Defender exclusions from various locations
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
This cmdlet attempts to find Windows Defender exclusions from various locations, such as the Registry, or the Event L... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/Environment.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 80,401 | function Get-CurrentUserSid {
[CmdletBinding()]
param()
if (-not (Test-CachedData -Name "CurrentUserSids")) {
$CurrentUserSids = @()
$UserIdentity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$UserIdentity.Groups | Select-Object -ExpandProperty Value | ForEach-Object... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/AccessControl.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 35,855 | function Get-ObjectAccessRight {
<#
.SYNOPSIS
Helper - Enumerates access rights the current user has on an object.
Author: @itm4n
License: BSD 3-Clause
.DESCRIPTION
This cmdlet retrieves the ACL of an object and returns the ACEs that grant modification permissions to the current user. It s... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/Utility.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 37,814 | function Test-IsRunningInConsole {
return $Host.Name -match "ConsoleHost"
}
function Test-IsMicrosoftFile {
[OutputType([Boolean])]
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[Object] $File
)
if ($File.VersionInfo.LegalCopyright -like "*Microsoft Corporation*") {
... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/SystemInformation.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 66,733 | function Get-ComClassEntryFromRegistry {
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[Guid] $Clsid
)
begin {
$RootKey = "HKLM\SOFTWARE\Classes\CLSID"
$FilteredComSubProperties = @( "InprocHandler", "InprocHandler32", "InprocServer", "InprocServer32", "Local... |
github | itm4n/PrivescCheck | https://github.com/itm4n/PrivescCheck | src/helper/Msi.ps1 | PowerShell | bsd-3-clause | 3,822 | master | 32,979 | function Invoke-MsiOpenDatabase {
param ( [object] $Installer, [string] $Path, [int] $Mode )
# https://learn.microsoft.com/en-us/windows/win32/msi/installer-opendatabase
# Installer.OpenDatabase(name, openMode)
# openMode = 0 (msiOpenDatabaseModeReadOnly)
$Installer.GetType().InvokeMember("OpenDatab... |
github | olafhartong/sysmon-modular | https://github.com/olafhartong/sysmon-modular | Merge-SysmonXml.ps1 | PowerShell | mit | 3,030 | master | 38,585 | $ASCII = @('
//** ***//
///#(** **%(///
((&&&** **&&&((
(&&&** ,(((((((. **&&&(
((&&**(((((//(((((((/**&&(( _____ __ __
(&&///((////(((((((///&&( / ___/__ ___________ ___ ____ _... |
github | hotvulcan/Thanos.sh | https://github.com/hotvulcan/Thanos.sh | Invoke-Thanos.ps1 | PowerShell | mit | 2,969 | master | 5,692 | <#
.SYNOPSIS
THANOS! Randomly removes about half of your objects.
.DESCRIPTION
Thanos enumerates the objects in the literal path specified by Path, and removes each file with probability 1/2.
Thanos supports FileSystem, Registry, Certificate, Variable, Function, Alias and Environment PowerShell provider... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | phishing/Phish-Creds.ps1 | PowerShell | mit | 2,934 | master | 887 | <#
try {
(Get-Credential -Credential $null).GetNetworkCredential() |
Select-Object @{name="User"; expression = {
If ($_.Domain -ne [string]::Empty) {
"{0}\{1}" -f ($_.Domain), ($_.UserName)
} Else {
$_.UserName
}
}
}, Password | Format-List
} catch {
}
One can additio... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Get-UserPasswordEntries.ps1 | PowerShell | mit | 2,934 | master | 1,624 | <#
This script enumerates user accounts in Active Directory and then collects
their .userPassword properties, decodes them and prints out.
Assuming we have PowerView's Get-DomainUser command available.
Usage:
PS> . .\Get-UserPasswordEntries.ps1
PS> Get-UserPasswordEntries
Mariusz Banach / mgeeky... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Disable-ScriptLogging.ps1 | PowerShell | mit | 2,934 | master | 5,428 | #requires -version 5
<#
.SYNOPSIS
Attempts to disable Script Block logging within current process using well-known techniques laid out in an unsignatured way.
Author: Mariusz Banach (@mgeeky)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Tries to evade Script Block ... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Count-PrivilegedGroupMembers.ps1 | PowerShell | mit | 2,934 | master | 1,848 | <#
This script enumerates privileged groups (Tier-) and counts their users.
By knowing how many privileged users are there in examined groups, we can
briefly estimate the configuration debt impact on the assessed Active Directory
or domain maintenance misconfiguration impact.
Usage:
PS> . .\Count-Privile... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Export-ReconData.ps1 | PowerShell | mit | 2,934 | master | 3,645 | #requires -version 2
<#
This script launches many PowerView cmdlets and stores their output in Clixml
files for later processing. This script is compatible with newest PowerView's version,
from dev branch (as of 2018) that uses Get-Domain*, Find-* (instead of Invoke-*) and others cmdlets.
Author: Mar... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1 | PowerShell | mit | 2,934 | master | 2,147 | #
# Unconstrained Domain Persistence helper
#
# Usage:
# PS> . .\Set-PrincipalAllowedToDelegateToAccount.ps1
# PS> Set-PrincipalAllowedToDelegateToAccount -TargetUser krbtgt -DelegateFrom COMPROMISED$
#
# Will allow for COMPROMISED$ account to perform S4U2 constrained delegation by the use
# of Resource-Based Const... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Get-DomainOUTree.ps1 | PowerShell | mit | 2,934 | master | 3,342 | #requires -version 2
<#
Author: Mariusz Banach (@mgeeky)
License: BSD 3-Clause
Required Dependencies: PowerView.ps1
Optional Dependencies: None
#>
function Get-DomainOUTree
{
<#
.SYNOPSIS
Author: Mariusz Banach (@mgeeky)
License: BSD 3-Clause
Required Dependencies: PowerView.ps1
... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Save-ReconData.ps1 | PowerShell | mit | 2,934 | master | 2,421 | #requires -version 2
<#
This script launches many PowerView cmdlets and stores their output
in Clixml files for later processing.
Author: Mariusz Banach (mgeeky), '18
License: BSD 3-Clause
Required Dependencies: PowerSploit's Recon.psm1
#>
function Save-ReconData
{
$DirName = (Get-Date).ToString("PowerView-M... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Disable-Amsi.ps1 | PowerShell | mit | 2,934 | master | 29,162 | #requires -version 5
<#
.SYNOPSIS
Attempts to disable AMSI within current process using well-known techniques laid out in an unsignatured way.
Author: Mariusz Banach (@mgeeky)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
.DESCRIPTION
Tries to evade AMSI by leveraging couple of... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Create-Lnk.ps1 | PowerShell | mit | 2,934 | master | 496 | param (
[Parameter(Mandatory=$true)]
[string]
$TargetPath,
[Parameter(Mandatory=$true)]
[string]
$OutputLnk,
[Parameter(Mandatory=$false)]
[string]
$Arguments = "",
[Parameter(Mandatory=$false)]
[string]
$WorkingDirectory = ""
)
$WshShell = New-Object -comObject WScript.Shell
$Shortcut = $WshShell.Creat... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/AMSITools/Get-AMSIScanResult.ps1 | PowerShell | mit | 2,934 | master | 3,906 | #Requires -RunAsAdministrator
function Get-AMSIScanResult {
<#
.SYNOPSIS
Starts AMSI ETW Trace and then either waits for user to trigger detection or scans input file.
Then collects AMSI events and prints them on output.
Based on Matt Graeber's AMSITools.ps1, sourced:
https://gist.github.com/mgraeber-rc/1eb42d3e... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/AMSITools/AMSITools.ps1 | PowerShell | mit | 2,934 | master | 14,027 | filter Send-AmsiContent {
<#
.SYNOPSIS
Supplies the AmsiScanBuffer function with a buffer to be scanned by an AMSI provider.
Author: Matt Graeber
Company: Red Canary
.DESCRIPTION
Send-AmsiContent is a wrapper for AMSI functions that passes off buffers to be scanned by an AMSI provider via the AmsiScanBuffer functio... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Bypass-ConstrainedLanguageMode/Bypass-CLM.ps1 | PowerShell | mit | 2,934 | master | 5,093 |
# -------------------------
$comName = "ClmDisableDll"
$comDescription = "CLM Disable COM"
$srcDllPath = '.\ClmDisableDll.dll'
$dstDllPath = "$($Env:Temp)\ClmDisableDll.dll"
$srcAssemblyPath = '.\ClmDisableAssembly.dll'
$dstAssemblyPath = "$($Env:Temp)\ClmDisableAssembly.dll"
$guid = "{394aaa50-684e-4870-911a-d045... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/rogue-dot-net/build.ps1 | PowerShell | mit | 2,934 | master | 1,065 | $key = 'BwIAAAAkAABSU0EyAAQAAAEAAQBhXtvkSeH85E31z64cAX+X2PWGc6DHP9VaoD13CljtYau9SesUzKVLJdHphY5ppg5clHIGaL7nZbp6qukLH0lLEq/vW979GWzVAgSZaGVCFpuk6p1y69cSr3STlzljJrY76JIjeS4+RhbdWHp99y8QhwRllOC0qu/WxZaffHS2te/PKzIiTuFfcP46qxQoLR8s3QZhAJBnn9TGJkbix8MTgEt7hD1DC2hXv7dKaC531ZWqGXB54OnuvFbD5P2t+vyvZuHNmAy3pX0BDXqwEfoZZ+hiIk1Y... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/C3-Client/speak.ps1 | PowerShell | mit | 2,934 | master | 164 | param (
[string]$message
)
Add-Type -AssemblyName System.Speech
$synth = New-Object -TypeName System.Speech.Synthesis.SpeechSynthesizer
$synth.Speak($message) |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | red-teaming/Self-Signed Threat/Sign-Artifact.ps1 | PowerShell | mit | 2,934 | master | 3,828 | Function Sign-Artifact {
<#
.SYNOPSIS
Signs input executable file with a faked Microsoft code signing certificate.
.DESCRIPTION
This script uses built-into Windows interfaces to import a fake Microsoft code-signing certificate
and use it to sign input executable artifact. Result wil... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | windows/Find-CLSIDForProgID.ps1 | PowerShell | mit | 2,934 | master | 160 | function Find-CLSIDForProgID($ProgId) {
Get-ChildItem REGISTRY::HKEY_CLASSES_ROOT\CLSID -Include PROGID -Recurse | where {$_.GetValue("") -match $ProgId }
} |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | windows/Simulate-DNSTunnel.ps1 | PowerShell | mit | 2,934 | master | 3,176 | <#
Simulate-DNSTunnel.ps1
Author: Mariusz Banach (@mgeeky)
License: GPL
Required Dependencies: None
Optional Dependencies: None
#>
$MaxQueryLength = 253
$MaxDnsLabelLength = 63
# Although it can get even up to 127, keeping it lower value may seem more genuine
$MaxNumberOfLevels = 5
function Si... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | clouds/azure/Azure Roles/Dump-AzureRoles.ps1 | PowerShell | mit | 2,934 | master | 4,362 | Function Get-ARTADRolePermissions {
<#
.SYNOPSIS
Shows Azure AD role permissions.
.DESCRIPTION
Displays all granted permissions on a specified Azure AD role.
.PARAMETER RoleName
Name of the role to inspect.
.EXAMPLE
PS> Get-ARTADRolePermissions -RoleName "Global Ad... |
github | mgeeky/Penetration-Testing-Tools | https://github.com/mgeeky/Penetration-Testing-Tools | others/Contoso-AD-Structure/Create-ADStructure.ps1 | PowerShell | mit | 2,934 | master | 2,420 | #
# Creates an utterly simple AD structure with groups, users and their profile images.
#
# This script was heavily based on:
# https://github.com/kurobeats/Active-Directory-User-Script
#
Import-module activedirectory
$dnsDomain =gc env:USERDNSDOMAIN
$split = $dnsDomain.split(".")
$domain=$null
foreach($part in $s... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | psakeFile.ps1 | PowerShell | mit | 2,868 | main | 2,379 | properties {
# Build settings
$PSBPreference.Build.CompileModule = $true
$PSBPreference.Build.CopyDirectories = @('Data')
$PSBPreference.Build.CompileHeader = @'
using namespace System.Management.Automation
using namespace System.Collections.ObjectModel
'@
# Test settings
$PSBPreference.Tes... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | requirements.psd1 | PowerShell | mit | 2,868 | main | 226 | @{
PSDependOptions = @{
Target = 'CurrentUser'
}
BuildHelpers = '2.0.16'
PowerHtml = 'latest'
PowerShellBuild = '0.6.1'
psake = '4.9.0'
PSScriptAnalyzer = '1.19.1'
} |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | build.ps1 | PowerShell | mit | 2,868 | main | 1,339 | [cmdletbinding(DefaultParameterSetName = 'Task')]
param(
# Build task(s) to execute
[parameter(ParameterSetName = 'task', position = 0)]
[string[]]$Task = 'default',
# Bootstrap dependencies
[switch]$Bootstrap,
# List available build tasks
[parameter(ParameterSetName = 'Help')]
[switch... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/MyAwesomeIconTheme.psd1 | PowerShell | mit | 2,868 | main | 576 | @{
Name = 'MyAwesomeTheme'
Types = @{
Directories = @{
'' = 'nf-fa-file'
symlink = 'nf-oct-file_symlink_directory'
junction = 'nf-fa-external_link'
WellKnown = @{
tests = 'nf-fa-gear'
}
}
Files =... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/Meta.tests.ps1 | PowerShell | mit | 2,868 | main | 1,545 | Describe 'Text files formatting' {
BeforeAll {
Set-StrictMode -Version latest
# Make sure MetaFixers.psm1 is loaded - it contains Get-TextFilesList
Import-Module -Name ([IO.Path]::Combine($PSScriptRoot, 'MetaFixers.psm1')) -Verbose:$false -Force
$projectRoot = $ENV:BHProjectPath
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/Manifest.tests.ps1 | PowerShell | mit | 2,868 | main | 3,218 | Describe 'Module manifest' {
BeforeAll {
$moduleName = $env:BHProjectName
$manifest = Test-ModuleManifest $env:BHPSModuleManifest
$outputDir = [IO.Path]::Combine($ENV:BHProjectPath, 'Output')
$outputModDir = [IO.Path]::Combine($outputDir, $env:BHProj... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/MyAwesomeColorTheme.psd1 | PowerShell | mit | 2,868 | main | 289 | @{
Name = 'MyAwesomeTheme'
Types = @{
Directories = @{
WellKnown = @{
tests = '98FB98'
}
}
Files = @{
WellKnown = @{
'.ps1' = '98FB98'
}
}
}
} |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/MetaFixers.psm1 | PowerShell | mit | 2,868 | main | 1,940 | # Taken with love from https://github.com/PowerShell/DscResource.Tests/blob/master/MetaFixers.psm1
<#
This module helps fix problems, found by Meta.Tests.ps1
#>
$ErrorActionPreference = 'stop'
Set-StrictMode -Version latest
function ConvertTo-UTF8() {
[CmdletBinding()]
[OutputType([void])]
param(
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/Help.tests.ps1 | PowerShell | mit | 2,868 | main | 3,648 | # Taken with love from @juneb_get_help (https://raw.githubusercontent.com/juneb/PesterTDD/master/Module.Help.Tests.ps1)
Describe 'Help' {
$testCases = Get-Command -Module $env:BHProjectName -CommandType Cmdlet, Function | ForEach-Object {
@{
Name = $_.Name
Command = $_
}
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/ScriptAnalyzerSettings.psd1 | PowerShell | mit | 2,868 | main | 59 | @{
ExcludeRules = @('PSUseBOMForUnicodeEncodedFile')
} |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/unit/Format-TerminalIcons.tests.ps1 | PowerShell | mit | 2,868 | main | 830 | Describe 'Format-TerminalIcons' {
BeforeAll {
$folderName = [System.IO.Path]::GetRandomFileName().Split('.')[0]
$fileName = [System.IO.Path]::GetRandomFileName().Split('.')[0] + '.someextension'
$folder = New-Item -Path "TestDrive:/$folderName" -Type Directory
$file = New... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/unit/Add-TerminalIconsIconTheme.tests.ps1 | PowerShell | mit | 2,868 | main | 1,082 | InModuleScope 'Terminal-Icons' {
Describe 'Add-TerminalIconsIconTheme' {
Context 'Themes' {
AfterAll {
$themeStorage = Get-ThemeStoragePath
Set-TerminalIconsTheme -ColorTheme devblackops -IconTheme devblackops
Remove-Item (Join-Path $themeStorage '... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | tests/unit/Add-TerminalIconsColorTheme.tests.ps1 | PowerShell | mit | 2,868 | main | 1,111 | InModuleScope 'Terminal-Icons' {
Describe 'Add-TerminalIconsColorTheme' {
Context 'Themes' {
AfterAll {
$themeStorage = Get-ThemeStoragePath
Set-TerminalIconsTheme -ColorTheme devblackops -IconTheme devblackops
Remove-Item (Join-Path $themeStorage ... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Terminal-Icons.psd1 | PowerShell | mit | 2,868 | main | 1,156 | @{
RootModule = 'Terminal-Icons.psm1'
ModuleVersion = '0.12.0'
GUID = '4419ddb6-3528-47cd-baf3-7fb9d8566620'
Author = 'Brandon Olin'
CompanyName = 'Community'
Copyright = '(c) Brandon Olin. All rights reserved.'
Description = 'PowerShell... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Terminal-Icons.psm1 | PowerShell | mit | 2,868 | main | 2,725 | # Dot source public/private functions
# $public = @(Get-ChildItem -Path ([IO.Path]::Combine($PSScriptRoot, 'Public/*.ps1')) -Recurse -ErrorAction Stop)
# $private = @(Get-ChildItem -Path ([IO.Path]::Combine($PSScriptRoot, 'Private/*.ps1')) -Recurse -ErrorAction Stop)
# @($public + $private).ForEach({
# try {
# ... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Data/colorThemes/dracula.psd1 | PowerShell | mit | 2,868 | main | 22,261 | @{
Name = 'dracula'
Types = @{
Directories = @{
symlink = '6272a4'
junction = '6272a4'
WellKnown = @{
docs = '8be9fd'
documents = '8be9fd'
desktop = '8be9fd'
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Data/colorThemes/devblackops.psd1 | PowerShell | mit | 2,868 | main | 22,265 | @{
Name = 'devblackops'
Types = @{
Directories = @{
symlink = '7373ff'
junction = '7373ff'
WellKnown = @{
docs = '00BFFF'
documents = '00BFFF'
desktop = '00FBFF'
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Data/colorThemes/devblackops_light.psd1 | PowerShell | mit | 2,868 | main | 19,062 | @{
Name = 'devblackops_light'
Types = @{
Directories = @{
symlink = '7373ff'
junction = '7373ff'
WellKnown = @{
docs = '00BFFF'
documents = '00BFFF'
desktop = '00c9cd'
benchmark = 'F08519'
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Data/iconThemes/devblackops.psd1 | PowerShell | mit | 2,868 | main | 26,732 | @{
Name = 'devblackops'
Types = @{
Directories = @{
# Default directory icon
'' = 'nf-oct-file_directory'
symlink = 'nf-cod-file_symlink_directory'
junction = 'nf-fa-external_link'
WellKnown = @{
docs ... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Import-IconTheme.ps1 | PowerShell | mit | 2,868 | main | 275 | function Import-IconTheme {
[OutputType([hashtable])]
[cmdletbinding()]
param()
$hash = @{}
(Get-ChildItem -Path $moduleRoot/Data/iconThemes).ForEach({
$hash.Add($_.Basename, (Import-PowerShellDataFile $_.FullName))
})
$hash
} |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/ConvertFrom-RGBColor.ps1 | PowerShell | mit | 2,868 | main | 503 | function ConvertFrom-RGBColor {
[OutputType([string])]
[CmdletBinding()]
param(
[Parameter(Mandatory, ValueFromPipeline)]
[ValidateNotNullOrEmpty()]
[string]$RGB
)
process {
$RGB = $RGB.Replace('#', '')
$r = [convert]::ToInt32($RGB.SubString(0,2), 16)
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Save-Preferences.ps1 | PowerShell | mit | 2,868 | main | 377 | function Save-Preferences {
[cmdletbinding()]
param(
[parameter(Mandatory, ValueFromPipeline)]
[hashtable]$Preferences,
[string]$Path = (Join-Path (Get-ThemeStoragePath) 'prefs.xml')
)
process {
Write-Debug ('Saving preferendces to [{0}]' -f $Path)
$Preferences ... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Add-Theme.ps1 | PowerShell | mit | 2,868 | main | 3,653 | function Add-Theme {
[cmdletbinding(DefaultParameterSetName = 'Path', SupportsShouldProcess)]
param(
[Parameter(
Mandatory,
ParameterSetName = 'Path',
Position = 0,
ValueFromPipeline,
ValueFromPipelineByPropertyName
)]
[Validat... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Get-ThemeStoragePath.ps1 | PowerShell | mit | 2,868 | main | 711 | function Get-ThemeStoragePath {
[OutputType([string])]
[CmdletBinding()]
param()
if ($IsLinux -or $IsMacOs) {
if (-not ($basePath = $env:XDG_CONFIG_HOME)) {
$basePath = [IO.Path]::Combine($HOME, '.local', 'share')
}
} else {
if (-not ($basePath = $env:APPDATA)) {... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/ConvertFrom-ColorEscapeSequence.ps1 | PowerShell | mit | 2,868 | main | 518 | function ConvertFrom-ColorEscapeSequence {
[OutputType([string])]
[CmdletBinding()]
param(
[Parameter(Mandatory, ValueFromPipeline)]
[ValidateNotNullOrEmpty()]
[string]$Sequence
)
process {
# Example input sequence: 'e[38;2;135;206;250m'
$arr = $Sequence.Spli... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Import-Preferences.ps1 | PowerShell | mit | 2,868 | main | 899 | function Import-Preferences {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '')]
[OutputType([hashtable])]
[cmdletbinding()]
param(
[parameter(ValueFromPipeline)]
[string]$Path = (Join-Path (Get-ThemeStoragePath) 'prefs.xml'),
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Import-ColorTheme.ps1 | PowerShell | mit | 2,868 | main | 445 | function Import-ColorTheme {
[OutputType([hashtable])]
[cmdletbinding()]
param()
$hash = @{}
(Get-ChildItem -Path $moduleRoot/Data/colorThemes).ForEach({
$colorData = Import-PowerShellDataFile $_.FullName
$hash[$colorData.Name] = $colorData
$hash[$colorData.Name].Types.Direc... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/ConvertTo-ColorSequence.ps1 | PowerShell | mit | 2,868 | main | 1,587 | function ConvertTo-ColorSequence {
[cmdletbinding()]
param(
[parameter(Mandatory, ValueFromPipeline)]
[hashtable]$ColorData
)
process {
$cs = New-EmptyColorTheme
$cs.Name = $ColorData.Name
# Directories
if ($ColorData.Types.Directories['symlink']) {... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Set-Theme.ps1 | PowerShell | mit | 2,868 | main | 1,008 | function Set-Theme {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '')]
[CmdletBinding()]
param(
[Parameter(Mandatory)]
[AllowNull()]
[AllowEmptyString()]
[string]$Name,
[ValidateSet('Color', 'Icon')]
[Param... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/New-EmptyColorTheme.ps1 | PowerShell | mit | 2,868 | main | 627 | function New-EmptyColorTheme {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '')]
[OutputType([hashtable])]
[cmdletbinding()]
param()
@{
Name = ''
Types = @{
Directories = @{
#'' = "`e[0m"
... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Save-Theme.ps1 | PowerShell | mit | 2,868 | main | 514 | function Save-Theme {
[CmdletBinding()]
param(
[Parameter(Mandatory, ValueFromPipeline)]
[hashtable]$Theme,
[ValidateSet('color', 'icon')]
[string]$Type,
[string]$Path = (Get-ThemeStoragePath)
)
process {
$themePath = Join-Path $Path "$($Theme.Name)_$($... |
github | devblackops/Terminal-Icons | https://github.com/devblackops/Terminal-Icons | Terminal-Icons/Private/Resolve-Icon.ps1 | PowerShell | mit | 2,868 | main | 5,227 | function Resolve-Icon {
[OutputType([hashtable])]
[CmdletBinding()]
param(
[Parameter(Mandatory, ValueFromPipeline)]
[IO.FileSystemInfo]$FileInfo,
[string]$IconTheme = $script:userThemeData.CurrentIconTheme,
[string]$ColorTheme = $script:userThemeData.CurrentColorTheme
... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | _Template/Get-Something.ps1 | PowerShell | mit | 2,846 | master | 1,428 | Function Get-Something {
<#
.SYNOPSIS
A brief description of the Get-Something function.
.DESCRIPTION
A detailed description of the Get-Something function.
.PARAMETER ComputerName
A description of the ComputerName parameter.
.PARAMETER Credential
A description of the Credential parameter.
.EXAMP... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | SCSM-Get-SCSMIncidentRequestComment/Get-SCSMIncidentRequestComment.ps1 | PowerShell | mit | 2,846 | master | 3,285 | function Get-SCSMIncidentRequestComment {
<#
.SYNOPSIS
Function to retrieve the comments from a Incident Request WorkItem
.DESCRIPTION
Function to retrieve the comments from a Incident Request WorkItem
.PARAMETER DateTime
Specifies from when (DateTime) the search need to look
... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-PSObjectEmptyOrNullProperty/Get-PSObjectEmptyOrNullProperty.ps1 | PowerShell | mit | 2,846 | master | 1,555 | function Get-PSObjectEmptyOrNullProperty {
<#
.SYNOPSIS
Function to Get all the empty or null properties with empty value in a PowerShell Object
.DESCRIPTION
Function to Get all the empty or null properties with empty value in a PowerShell Object.
I used this function in a System Center Orchestrator wh... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Remove-HashTableEmptyValue/Remove-HashTableEmptyValue.ps1 | PowerShell | mit | 2,846 | master | 1,012 | Function Remove-HashTableEmptyValue {
<#
.SYNOPSIS
This function will remove the empty or Null entry of a hashtable object
.DESCRIPTION
This function will remove the empty or Null entry of a hashtable object
.PARAMETER Hashtable
Specifies the hashtable that will be cleaned up.
.EXAMPLE
Remove-HashTa... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-ComputerOS/Get-ComputerOS.ps1 | PowerShell | mit | 2,846 | master | 4,096 | function Get-ComputerOS {
<#
.SYNOPSIS
function to retrieve the Operating System of a machine
.DESCRIPTION
function to retrieve the Operating System of a machine
.PARAMETER ComputerName
Specifies the ComputerName of the machine to query. Default is localhost.
.PARAMETER Cr... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-StringLastDigit/Get-StringLastDigit.ps1 | PowerShell | mit | 2,846 | master | 1,067 | function Get-StringLastDigit {
<#
.SYNOPSIS
Get the last digit of a string
.DESCRIPTION
Get the last digit of a string using Regular Expression
.PARAMETER String
Specifies the String to check
.EXAMPLE
PS C:\> Get-StringLastDigit -String "Francois-Xavier.cat5"
5
.EXAMPLE
PS C:\> Get-StringLastDi... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | AD-GPO-Get-ADGPOReplication/AD-GPO-Get-ADGPOReplication.ps1 | PowerShell | mit | 2,846 | master | 4,348 | function Get-ADGPOReplication {
<#
.SYNOPSIS
This function retrieve one or all the GPO and report their DSVersions and SysVolVersions (Users and Computers)
.DESCRIPTION
This function retrieve one or all the GPO and report their DSVersions and SysVolVersions (Users and Computers)
.PARAMET... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-Uptime/Get-Uptime.ps1 | PowerShell | mit | 2,846 | master | 6,532 | function Get-Uptime {
<#
.SYNOPSIS
The function Get-Uptime will get uptime of a local or remote machine.
.DESCRIPTION
The function Get-Uptime will get uptime of a local or remote machine.
This function is compatible with CIM sessions and alternative credentials.
.PARAMETER ComputerName
Specifies the c... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | SCCM-Set-SCCMClientCacheSize/Set-SCCMClientCacheSize.ps1 | PowerShell | mit | 2,846 | master | 2,450 | function Set-SCCMClientCacheSize {
<#
.SYNOPSIS
Function to set the cache size on a SCCM Client
.DESCRIPTION
Function to set the cache size on a SCCM Client
.PARAMETER ComputerName
Specifies the name of the client on which the Cache size need to be changed... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-New-DjoinFile/New-DjoinFile.ps1 | PowerShell | mit | 2,846 | master | 2,059 | function New-DjoinFile {
<#
.SYNOPSIS
Function to generate a blob file accepted by djoin.exe tool (offline domain join)
.DESCRIPTION
Function to generate a blob file accepted by djoin.exe tool (offline domain join)
This function can create a file compatible with djoin with the Blob... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-ImageInformation/Get-ImageInformation.ps1 | PowerShell | mit | 2,846 | master | 728 | function Get-ImageInformation {
<#
.SYNOPSIS
function to retrieve Image file information
.DESCRIPTION
function to retrieve Image file information
.PARAMETER FilePath
Specify one or multiple image file path(s).
.EXAMPLE
PS C:\> Get-ImageInformation -FilePath c:\temp\image.png
.NOTES
Francois-... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | SCCM-Remove-SCCMUserDeviceAffinity/Remove-SCCMUserDeviceAffinity.ps1 | PowerShell | mit | 2,846 | master | 2,823 | function Remove-SCCMUserDeviceAffinity {
<#
.SYNOPSIS
Function to remove the primary user(s) or group(s) from a device in SCCM
.DESCRIPTION
Function to remove the primary user(s) or group(s) from a device in SCCM
.PARAMETER SiteCode
Specifies the SCCM Site Code
.PARAMETER ... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Expand-ScriptAlias/Expand-ScriptAlias.ps1 | PowerShell | mit | 2,846 | master | 4,607 | function Expand-ScriptAlias {
<#
.SYNOPSIS
Function to replace Aliases used in a script by their fullname
.DESCRIPTION
Function to replace Aliases used in a script by their fullname.
Using PowerShell AST we are able to retrieve the functions and cmdlets used in a script.
.PARAM... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-NetFrameworkTypeAccelerator/Get-NetFrameworkTypeAccelerator.ps1 | PowerShell | mit | 2,846 | master | 773 | function Get-NetFrameworkTypeAccelerator {
<#
.SYNOPSIS
Function to retrieve the list of Type Accelerator available
.DESCRIPTION
Function to retrieve the list of Type Accelerator available
.EXAMPLE
Get-NetFrameworkTypeAccelerator
Return the list of Type Accelerator available on your system
.EXAMPL... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Enable-RemoteDesktop/Enable-RemoteDesktop.ps1 | PowerShell | mit | 2,846 | master | 7,295 | function Enable-RemoteDesktop {
<#
.SYNOPSIS
The function Enable-RemoteDesktop will enable RemoteDesktop on a local or remote machine.
.DESCRIPTION
The function Enable-RemoteDesktop will enable RemoteDesktop on a local or remote machine.
.PARAMETER ComputerName
Specifies the co... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | VMWARE-HOST-List_VIB/VMWARE-HOST-List_VIB.ps1 | PowerShell | mit | 2,846 | master | 6,330 | <#
.DESCRIPTION
This Script retrieve the VIB information on all the VMware Host
.PARAMETER AllVib
This is the default parameter to retrieve all the VIBs information
.PARAMETER VIBName
Specifies a specific VIB Name
.PARAMETER VIBVendor
Specifies a specific VIB Vendor
.EXAMPLE
VMWARE-HOST-List_VIB.ps1 -Al... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-HashTableNotEmptyValue/Get-HashTableNotEmptyOrNullValue.ps1 | PowerShell | mit | 2,846 | master | 743 | Function Get-HashTableNotEmptyOrNullValue {
<#
.SYNOPSIS
This function will get the values that are not empty or Null in a hashtable object
.DESCRIPTION
This function will get the values that are not empty or Null in a hashtable object
.PARAMETER Hashtable
Specifies the hashtable that will be showed
.EX... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-ConvertTo-Base64/ConvertTo-Base64.ps1 | PowerShell | mit | 2,846 | master | 837 | function ConvertTo-Base64 {
<#
.SYNOPSIS
Function to convert an image to Base64
.DESCRIPTION
Function to convert an image to Base64
.PARAMETER Path
Specifies the path of the file
.EXAMPLE
ConvertTo-Base64 -Path "C:\images\PowerShellLogo.png"
.NOTES
Fra... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-NetStat/Get-NetStat.ps1 | PowerShell | mit | 2,846 | master | 1,486 | function Get-NetStat {
<#
.SYNOPSIS
This function will get the output of netstat -n and parse the output
.DESCRIPTION
This function will get the output of netstat -n and parse the output
.EXAMPLE
Get-Netstat
.LINK
https://lazywinadmin.com/2014/08/powershell-parse-this-netstatexe.html
.NOTES
Fran... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | AZURE-Get-AzureIPRangesAndServiceTags/Get-AzureIPRangesAndServiceTags.ps1 | PowerShell | mit | 2,846 | master | 3,509 | function Get-AzureIPRangesAndServiceTags {
<#
.SYNOPSIS
Retrieve the Ip address ranges and Service Tags ranges for Azure (Public, USgov, Germnay or China)
The function return a Json. This can be passed to '|Converfrom-json' if you wish
to get a PowerShell object.
This information is pulled from Microsoft Download pag... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Lock-Computer/Lock-Computer.ps1 | PowerShell | mit | 2,846 | master | 587 | Function Lock-Computer {
<#
.DESCRIPTION
Function to Lock your computer
.SYNOPSIS
Function to Lock your computer.
This is using the win32 user32.dll library.
.EXAMPLE
Lock-Computer
This will lock the current computer
.LINK
https://github.com/lazywinadmin/PowerShell
#>
$signature = @"
[... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | AD-OBJECT-Get-ADSITokenGroup/Get-ADSITokenGroup.ps1 | PowerShell | mit | 2,846 | master | 4,551 | function Get-ADSITokenGroup {
<#
.SYNOPSIS
Retrieve the list of group present in the tokengroups of a user or computer object.
.DESCRIPTION
Retrieve the list of group present in the tokengroups of a user or computer object.
TokenGroups attribute
https://msdn.microsoft.com/en... |
github | lazywinadmin/PowerShell | https://github.com/lazywinadmin/PowerShell | TOOL-Get-BatteryStatus/Get-BatteryStatus.ps1 | PowerShell | mit | 2,846 | master | 542 | function Get-BatteryStatus {
<#
.SYNOPSIS
Retrieve battery information
.DESCRIPTION
Retrieve battery information
.EXAMPLE
Get-BatteryStatus
.NOTES
http://www.powershellmagazine.com/2012/10/18/pstip-get-system-power-information/
.LINK
https://github.com/lazywinadmi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.