source
stringclasses
1 value
repo
stringclasses
33 values
repo_url
stringclasses
33 values
path
stringlengths
7
179
language
stringclasses
1 value
license
stringclasses
4 values
stars
int64
2.27k
53.4k
ref
stringclasses
4 values
size_bytes
int64
48
259k
text
stringlengths
48
259k
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/core/WinApi.ps1
PowerShell
bsd-3-clause
3,822
master
16,079
$FunctionDefinitions = @( (New-Function advapi32 OpenSCManager ([IntPtr]) @([String], [String], [UInt32]) ([Runtime.InteropServices.CallingConvention]::Winapi) ([Runtime.InteropServices.CharSet]::Unicode) -SetLastError -EntryPoint OpenSCManager), (New-Function advapi32 OpenService ([IntPtr]) @([IntPtr], [String...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/core/WinApi.Wrappers.ps1
PowerShell
bsd-3-clause
3,822
master
116,960
function Format-Error { <# .SYNOPSIS Helper - Format a Windows standard error message. Author: @itm4n License: BSD 3-Clause .DESCRIPTION This cmdlet returns a formatted error message given a standard Windows error code. .PARAMETER Code A mandatory standard Windows error code. ...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/core/WinApi.Enum.ps1
PowerShell
bsd-3-clause
3,822
master
31,903
$script:SeverityLevel = New-Enum $Module WinApiModule.SeverityLevel UInt32 @{ None = 0 Low = 1 Medium = 2 High = 3 } $script:SystemErrorCode = New-Enum $Module WinApiModule.SystemE...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/core/Reflection.ps1
PowerShell
bsd-3-clause
3,822
master
21,614
function New-DynamicModule { <# .SYNOPSIS Short description .DESCRIPTION Long description .PARAMETER ModuleName Parameter description .EXAMPLE An example .NOTES https://github.com/jborean93/PowerShell-AnsibleVault/blob/master/AnsibleVault/Private/Invoke-Win32Api.ps1 #...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Hardening.ps1
PowerShell
bsd-3-clause
3,822
master
64,474
function Invoke-UserAccountControlCheck { <# .SYNOPSIS Checks whether UAC (User Access Control) is enabled Author: @itm4n License: BSD 3-Clause .DESCRIPTION The state of UAC can be determined based on the value of the parameter "EnableLUA" in the following registry key: HKLM\Software\M...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/User.ps1
PowerShell
bsd-3-clause
3,822
master
13,404
function Invoke-UserCheck { <# .SYNOPSIS Get various information about the current user. Author: @itm4n License: BSD 3-Clause .DESCRIPTION Get various information about the current user. .EXAMPLE PS C:\> Invoke-UserCheck Name : DESKTOP-AAAAAAAA\Lab-User SID ...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Misc.ps1
PowerShell
bsd-3-clause
3,822
master
55,817
function Invoke-SystemInformationCheck { <# .SYNOPSIS Gets the name of the operating system and the full version string. Author: @itm4n License: BSD 3-Clause .DESCRIPTION Reads the "Product Name" from the registry and gets the full version string based on the operating system. .EXAMPL...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Globals.ps1
PowerShell
bsd-3-clause
3,822
master
1,230
$script:GlobalVariable = @{ CheckResultList = $null } $script:GlobalCache = @{ CurrentUserSids = $null CurrentUserDenySids = $null DriverList = $null InstalledApplicationList = $null RegisteredComList = $null ServiceList = $null Schedu...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Updates.ps1
PowerShell
bsd-3-clause
3,822
master
7,895
function Invoke-WindowsUpdateCheck { <# .SYNOPSIS Gets the last update time of the machine. Author: @itm4n License: BSD 3-Clause .DESCRIPTION The Windows Update status can be queried thanks to the Microsoft.Update.AutoUpdate COM object. It gives the last successful search time and the last...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Applications.ps1
PowerShell
bsd-3-clause
3,822
master
18,025
function Invoke-InstalledApplicationCheck { <# .SYNOPSIS Get information about Microsoft applications installed on the machine by searching the registry and the default install locations. Author: @itm4n License: BSD 3-Clause .DESCRIPTION Uses the custom "Get-InstalledApplication" function ...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/ScheduledTasks.ps1
PowerShell
bsd-3-clause
3,822
master
13,028
function Invoke-ScheduledTaskImagePermissionCheck { <# .SYNOPSIS Enumerates scheduled tasks with a modifiable path Author: @itm4n License: BSD 3-Clause .DESCRIPTION This function enumerates all the scheduled tasks which are visible by the current user but are not owned by the current user....
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Credentials.ps1
PowerShell
bsd-3-clause
3,822
master
44,112
function Invoke-WinLogonCredentialCheck { <# .SYNOPSIS Checks credentials stored in the Winlogon registry key Author: @itm4n, @nurfed1 License: BSD 3-Clause .DESCRIPTION Windows has a registry setting to enable automatic logon. You can set a username and a password in order to automaticall...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Services.ps1
PowerShell
bsd-3-clause
3,822
master
29,018
function Invoke-InstalledServiceCheck { <# .SYNOPSIS Enumerates non-default services Author: @itm4n License: BSD 3-Clause .DESCRIPTION It uses the custom "Get-ServiceFromRegistry" function to get a filtered list of services that are configured on the local machine. Then it returns each res...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Main.ps1
PowerShell
bsd-3-clause
3,822
master
27,556
function Invoke-PrivescCheck { <# .SYNOPSIS Enumerates common security misconfigurations that can be exploited for privilege escalation purposes. Author: @itm4n License: BSD 3-Clause .DESCRIPTION This script aims to identify security misconfigurations that are relevant for privilege escala...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Configuration.ps1
PowerShell
bsd-3-clause
3,822
master
81,601
function Invoke-RegistryAlwaysInstallElevatedCheck { <# .SYNOPSIS Checks whether the AlwaysInstallElevated key is set in the registry. Author: @itm4n License: BSD 3-Clause .DESCRIPTION AlwaysInstallElevated can be configured in both HKLM and HKCU. "If the AlwaysInstallElevated value is not...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/check/Network.ps1
PowerShell
bsd-3-clause
3,822
master
18,468
function Invoke-NetworkAdapterCheck { <# .SYNOPSIS Collect detailed information about all Ethernet and Wi-Fi network adapters. Author: @itm4n License: BSD 3-Clause .DESCRIPTION Collect detailed information about all active Ethernet adapters. .EXAMPLE PS C:\> Invoke-NetworkAdapterC...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/Cache.ps1
PowerShell
bsd-3-clause
3,822
master
1,820
function Test-CachedData { [OutputType([Bool])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [String] $Name ) $CacheEntryFound = $false foreach ($CacheEntryName in $script:GlobalCache.Keys) { if ($CacheEntryName -eq $Name) { return $null -ne $sc...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/SystemConfiguration.ps1
PowerShell
bsd-3-clause
3,822
master
91,106
function Get-WindowsDefenderExclusion { <# .SYNOPSIS Helper - Enumerate Windows Defender exclusions from various locations Author: @itm4n License: BSD 3-Clause .DESCRIPTION This cmdlet attempts to find Windows Defender exclusions from various locations, such as the Registry, or the Event L...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/Environment.ps1
PowerShell
bsd-3-clause
3,822
master
80,401
function Get-CurrentUserSid { [CmdletBinding()] param() if (-not (Test-CachedData -Name "CurrentUserSids")) { $CurrentUserSids = @() $UserIdentity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $UserIdentity.Groups | Select-Object -ExpandProperty Value | ForEach-Object...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/AccessControl.ps1
PowerShell
bsd-3-clause
3,822
master
35,855
function Get-ObjectAccessRight { <# .SYNOPSIS Helper - Enumerates access rights the current user has on an object. Author: @itm4n License: BSD 3-Clause .DESCRIPTION This cmdlet retrieves the ACL of an object and returns the ACEs that grant modification permissions to the current user. It s...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/Utility.ps1
PowerShell
bsd-3-clause
3,822
master
37,814
function Test-IsRunningInConsole { return $Host.Name -match "ConsoleHost" } function Test-IsMicrosoftFile { [OutputType([Boolean])] [CmdletBinding()] param( [Parameter(Mandatory = $true)] [Object] $File ) if ($File.VersionInfo.LegalCopyright -like "*Microsoft Corporation*") { ...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/SystemInformation.ps1
PowerShell
bsd-3-clause
3,822
master
66,733
function Get-ComClassEntryFromRegistry { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [Guid] $Clsid ) begin { $RootKey = "HKLM\SOFTWARE\Classes\CLSID" $FilteredComSubProperties = @( "InprocHandler", "InprocHandler32", "InprocServer", "InprocServer32", "Local...
github
itm4n/PrivescCheck
https://github.com/itm4n/PrivescCheck
src/helper/Msi.ps1
PowerShell
bsd-3-clause
3,822
master
32,979
function Invoke-MsiOpenDatabase { param ( [object] $Installer, [string] $Path, [int] $Mode ) # https://learn.microsoft.com/en-us/windows/win32/msi/installer-opendatabase # Installer.OpenDatabase(name, openMode) # openMode = 0 (msiOpenDatabaseModeReadOnly) $Installer.GetType().InvokeMember("OpenDatab...
github
olafhartong/sysmon-modular
https://github.com/olafhartong/sysmon-modular
Merge-SysmonXml.ps1
PowerShell
mit
3,030
master
38,585
$ASCII = @(' //** ***// ///#(** **%(/// ((&&&** **&&&(( (&&&** ,(((((((. **&&&( ((&&**(((((//(((((((/**&&(( _____ __ __ (&&///((////(((((((///&&( / ___/__ ___________ ___ ____ _...
github
hotvulcan/Thanos.sh
https://github.com/hotvulcan/Thanos.sh
Invoke-Thanos.ps1
PowerShell
mit
2,969
master
5,692
<# .SYNOPSIS THANOS! Randomly removes about half of your objects. .DESCRIPTION Thanos enumerates the objects in the literal path specified by Path, and removes each file with probability 1/2. Thanos supports FileSystem, Registry, Certificate, Variable, Function, Alias and Environment PowerShell provider...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
phishing/Phish-Creds.ps1
PowerShell
mit
2,934
master
887
<# try { (Get-Credential -Credential $null).GetNetworkCredential() | Select-Object @{name="User"; expression = { If ($_.Domain -ne [string]::Empty) { "{0}\{1}" -f ($_.Domain), ($_.UserName) } Else { $_.UserName } } }, Password | Format-List } catch { } One can additio...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Get-UserPasswordEntries.ps1
PowerShell
mit
2,934
master
1,624
<# This script enumerates user accounts in Active Directory and then collects their .userPassword properties, decodes them and prints out. Assuming we have PowerView's Get-DomainUser command available. Usage: PS> . .\Get-UserPasswordEntries.ps1 PS> Get-UserPasswordEntries Mariusz Banach / mgeeky...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Disable-ScriptLogging.ps1
PowerShell
mit
2,934
master
5,428
#requires -version 5 <# .SYNOPSIS Attempts to disable Script Block logging within current process using well-known techniques laid out in an unsignatured way. Author: Mariusz Banach (@mgeeky) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Tries to evade Script Block ...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Count-PrivilegedGroupMembers.ps1
PowerShell
mit
2,934
master
1,848
<# This script enumerates privileged groups (Tier-) and counts their users. By knowing how many privileged users are there in examined groups, we can briefly estimate the configuration debt impact on the assessed Active Directory or domain maintenance misconfiguration impact. Usage: PS> . .\Count-Privile...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Export-ReconData.ps1
PowerShell
mit
2,934
master
3,645
#requires -version 2 <# This script launches many PowerView cmdlets and stores their output in Clixml files for later processing. This script is compatible with newest PowerView's version, from dev branch (as of 2018) that uses Get-Domain*, Find-* (instead of Invoke-*) and others cmdlets. Author: Mar...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1
PowerShell
mit
2,934
master
2,147
# # Unconstrained Domain Persistence helper # # Usage: # PS> . .\Set-PrincipalAllowedToDelegateToAccount.ps1 # PS> Set-PrincipalAllowedToDelegateToAccount -TargetUser krbtgt -DelegateFrom COMPROMISED$ # # Will allow for COMPROMISED$ account to perform S4U2 constrained delegation by the use # of Resource-Based Const...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Get-DomainOUTree.ps1
PowerShell
mit
2,934
master
3,342
#requires -version 2 <# Author: Mariusz Banach (@mgeeky) License: BSD 3-Clause Required Dependencies: PowerView.ps1 Optional Dependencies: None #> function Get-DomainOUTree { <# .SYNOPSIS Author: Mariusz Banach (@mgeeky) License: BSD 3-Clause Required Dependencies: PowerView.ps1 ...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Save-ReconData.ps1
PowerShell
mit
2,934
master
2,421
#requires -version 2 <# This script launches many PowerView cmdlets and stores their output in Clixml files for later processing. Author: Mariusz Banach (mgeeky), '18 License: BSD 3-Clause Required Dependencies: PowerSploit's Recon.psm1 #> function Save-ReconData { $DirName = (Get-Date).ToString("PowerView-M...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Disable-Amsi.ps1
PowerShell
mit
2,934
master
29,162
#requires -version 5 <# .SYNOPSIS Attempts to disable AMSI within current process using well-known techniques laid out in an unsignatured way. Author: Mariusz Banach (@mgeeky) License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None .DESCRIPTION Tries to evade AMSI by leveraging couple of...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Create-Lnk.ps1
PowerShell
mit
2,934
master
496
param ( [Parameter(Mandatory=$true)] [string] $TargetPath, [Parameter(Mandatory=$true)] [string] $OutputLnk, [Parameter(Mandatory=$false)] [string] $Arguments = "", [Parameter(Mandatory=$false)] [string] $WorkingDirectory = "" ) $WshShell = New-Object -comObject WScript.Shell $Shortcut = $WshShell.Creat...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/AMSITools/Get-AMSIScanResult.ps1
PowerShell
mit
2,934
master
3,906
#Requires -RunAsAdministrator function Get-AMSIScanResult { <# .SYNOPSIS Starts AMSI ETW Trace and then either waits for user to trigger detection or scans input file. Then collects AMSI events and prints them on output. Based on Matt Graeber's AMSITools.ps1, sourced: https://gist.github.com/mgraeber-rc/1eb42d3e...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/AMSITools/AMSITools.ps1
PowerShell
mit
2,934
master
14,027
filter Send-AmsiContent { <# .SYNOPSIS Supplies the AmsiScanBuffer function with a buffer to be scanned by an AMSI provider. Author: Matt Graeber Company: Red Canary .DESCRIPTION Send-AmsiContent is a wrapper for AMSI functions that passes off buffers to be scanned by an AMSI provider via the AmsiScanBuffer functio...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Bypass-ConstrainedLanguageMode/Bypass-CLM.ps1
PowerShell
mit
2,934
master
5,093
 # ------------------------- $comName = "ClmDisableDll" $comDescription = "CLM Disable COM" $srcDllPath = '.\ClmDisableDll.dll' $dstDllPath = "$($Env:Temp)\ClmDisableDll.dll" $srcAssemblyPath = '.\ClmDisableAssembly.dll' $dstAssemblyPath = "$($Env:Temp)\ClmDisableAssembly.dll" $guid = "{394aaa50-684e-4870-911a-d045...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/rogue-dot-net/build.ps1
PowerShell
mit
2,934
master
1,065
$key = 'BwIAAAAkAABSU0EyAAQAAAEAAQBhXtvkSeH85E31z64cAX+X2PWGc6DHP9VaoD13CljtYau9SesUzKVLJdHphY5ppg5clHIGaL7nZbp6qukLH0lLEq/vW979GWzVAgSZaGVCFpuk6p1y69cSr3STlzljJrY76JIjeS4+RhbdWHp99y8QhwRllOC0qu/WxZaffHS2te/PKzIiTuFfcP46qxQoLR8s3QZhAJBnn9TGJkbix8MTgEt7hD1DC2hXv7dKaC531ZWqGXB54OnuvFbD5P2t+vyvZuHNmAy3pX0BDXqwEfoZZ+hiIk1Y...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/C3-Client/speak.ps1
PowerShell
mit
2,934
master
164
param ( [string]$message ) Add-Type -AssemblyName System.Speech $synth = New-Object -TypeName System.Speech.Synthesis.SpeechSynthesizer $synth.Speak($message)
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
red-teaming/Self-Signed Threat/Sign-Artifact.ps1
PowerShell
mit
2,934
master
3,828
Function Sign-Artifact { <# .SYNOPSIS Signs input executable file with a faked Microsoft code signing certificate. .DESCRIPTION This script uses built-into Windows interfaces to import a fake Microsoft code-signing certificate and use it to sign input executable artifact. Result wil...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
windows/Find-CLSIDForProgID.ps1
PowerShell
mit
2,934
master
160
function Find-CLSIDForProgID($ProgId) { Get-ChildItem REGISTRY::HKEY_CLASSES_ROOT\CLSID -Include PROGID -Recurse | where {$_.GetValue("") -match $ProgId } }
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
windows/Simulate-DNSTunnel.ps1
PowerShell
mit
2,934
master
3,176
<# Simulate-DNSTunnel.ps1 Author: Mariusz Banach (@mgeeky) License: GPL Required Dependencies: None Optional Dependencies: None #> $MaxQueryLength = 253 $MaxDnsLabelLength = 63 # Although it can get even up to 127, keeping it lower value may seem more genuine $MaxNumberOfLevels = 5 function Si...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
clouds/azure/Azure Roles/Dump-AzureRoles.ps1
PowerShell
mit
2,934
master
4,362
Function Get-ARTADRolePermissions { <# .SYNOPSIS Shows Azure AD role permissions. .DESCRIPTION Displays all granted permissions on a specified Azure AD role. .PARAMETER RoleName Name of the role to inspect. .EXAMPLE PS> Get-ARTADRolePermissions -RoleName "Global Ad...
github
mgeeky/Penetration-Testing-Tools
https://github.com/mgeeky/Penetration-Testing-Tools
others/Contoso-AD-Structure/Create-ADStructure.ps1
PowerShell
mit
2,934
master
2,420
# # Creates an utterly simple AD structure with groups, users and their profile images. # # This script was heavily based on: # https://github.com/kurobeats/Active-Directory-User-Script # Import-module activedirectory $dnsDomain =gc env:USERDNSDOMAIN $split = $dnsDomain.split(".") $domain=$null foreach($part in $s...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
psakeFile.ps1
PowerShell
mit
2,868
main
2,379
properties { # Build settings $PSBPreference.Build.CompileModule = $true $PSBPreference.Build.CopyDirectories = @('Data') $PSBPreference.Build.CompileHeader = @' using namespace System.Management.Automation using namespace System.Collections.ObjectModel '@ # Test settings $PSBPreference.Tes...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
requirements.psd1
PowerShell
mit
2,868
main
226
@{ PSDependOptions = @{ Target = 'CurrentUser' } BuildHelpers = '2.0.16' PowerHtml = 'latest' PowerShellBuild = '0.6.1' psake = '4.9.0' PSScriptAnalyzer = '1.19.1' }
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
build.ps1
PowerShell
mit
2,868
main
1,339
[cmdletbinding(DefaultParameterSetName = 'Task')] param( # Build task(s) to execute [parameter(ParameterSetName = 'task', position = 0)] [string[]]$Task = 'default', # Bootstrap dependencies [switch]$Bootstrap, # List available build tasks [parameter(ParameterSetName = 'Help')] [switch...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/MyAwesomeIconTheme.psd1
PowerShell
mit
2,868
main
576
@{ Name = 'MyAwesomeTheme' Types = @{ Directories = @{ '' = 'nf-fa-file' symlink = 'nf-oct-file_symlink_directory' junction = 'nf-fa-external_link' WellKnown = @{ tests = 'nf-fa-gear' } } Files =...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/Meta.tests.ps1
PowerShell
mit
2,868
main
1,545
Describe 'Text files formatting' { BeforeAll { Set-StrictMode -Version latest # Make sure MetaFixers.psm1 is loaded - it contains Get-TextFilesList Import-Module -Name ([IO.Path]::Combine($PSScriptRoot, 'MetaFixers.psm1')) -Verbose:$false -Force $projectRoot = $ENV:BHProjectPath ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/Manifest.tests.ps1
PowerShell
mit
2,868
main
3,218
Describe 'Module manifest' { BeforeAll { $moduleName = $env:BHProjectName $manifest = Test-ModuleManifest $env:BHPSModuleManifest $outputDir = [IO.Path]::Combine($ENV:BHProjectPath, 'Output') $outputModDir = [IO.Path]::Combine($outputDir, $env:BHProj...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/MyAwesomeColorTheme.psd1
PowerShell
mit
2,868
main
289
@{ Name = 'MyAwesomeTheme' Types = @{ Directories = @{ WellKnown = @{ tests = '98FB98' } } Files = @{ WellKnown = @{ '.ps1' = '98FB98' } } } }
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/MetaFixers.psm1
PowerShell
mit
2,868
main
1,940
# Taken with love from https://github.com/PowerShell/DscResource.Tests/blob/master/MetaFixers.psm1 <# This module helps fix problems, found by Meta.Tests.ps1 #> $ErrorActionPreference = 'stop' Set-StrictMode -Version latest function ConvertTo-UTF8() { [CmdletBinding()] [OutputType([void])] param( ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/Help.tests.ps1
PowerShell
mit
2,868
main
3,648
# Taken with love from @juneb_get_help (https://raw.githubusercontent.com/juneb/PesterTDD/master/Module.Help.Tests.ps1) Describe 'Help' { $testCases = Get-Command -Module $env:BHProjectName -CommandType Cmdlet, Function | ForEach-Object { @{ Name = $_.Name Command = $_ } ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/ScriptAnalyzerSettings.psd1
PowerShell
mit
2,868
main
59
@{ ExcludeRules = @('PSUseBOMForUnicodeEncodedFile') }
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/unit/Format-TerminalIcons.tests.ps1
PowerShell
mit
2,868
main
830
Describe 'Format-TerminalIcons' { BeforeAll { $folderName = [System.IO.Path]::GetRandomFileName().Split('.')[0] $fileName = [System.IO.Path]::GetRandomFileName().Split('.')[0] + '.someextension' $folder = New-Item -Path "TestDrive:/$folderName" -Type Directory $file = New...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/unit/Add-TerminalIconsIconTheme.tests.ps1
PowerShell
mit
2,868
main
1,082
InModuleScope 'Terminal-Icons' { Describe 'Add-TerminalIconsIconTheme' { Context 'Themes' { AfterAll { $themeStorage = Get-ThemeStoragePath Set-TerminalIconsTheme -ColorTheme devblackops -IconTheme devblackops Remove-Item (Join-Path $themeStorage '...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
tests/unit/Add-TerminalIconsColorTheme.tests.ps1
PowerShell
mit
2,868
main
1,111
InModuleScope 'Terminal-Icons' { Describe 'Add-TerminalIconsColorTheme' { Context 'Themes' { AfterAll { $themeStorage = Get-ThemeStoragePath Set-TerminalIconsTheme -ColorTheme devblackops -IconTheme devblackops Remove-Item (Join-Path $themeStorage ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Terminal-Icons.psd1
PowerShell
mit
2,868
main
1,156
@{ RootModule = 'Terminal-Icons.psm1' ModuleVersion = '0.12.0' GUID = '4419ddb6-3528-47cd-baf3-7fb9d8566620' Author = 'Brandon Olin' CompanyName = 'Community' Copyright = '(c) Brandon Olin. All rights reserved.' Description = 'PowerShell...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Terminal-Icons.psm1
PowerShell
mit
2,868
main
2,725
# Dot source public/private functions # $public = @(Get-ChildItem -Path ([IO.Path]::Combine($PSScriptRoot, 'Public/*.ps1')) -Recurse -ErrorAction Stop) # $private = @(Get-ChildItem -Path ([IO.Path]::Combine($PSScriptRoot, 'Private/*.ps1')) -Recurse -ErrorAction Stop) # @($public + $private).ForEach({ # try { # ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Data/colorThemes/dracula.psd1
PowerShell
mit
2,868
main
22,261
@{ Name = 'dracula' Types = @{ Directories = @{ symlink = '6272a4' junction = '6272a4' WellKnown = @{ docs = '8be9fd' documents = '8be9fd' desktop = '8be9fd' ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Data/colorThemes/devblackops.psd1
PowerShell
mit
2,868
main
22,265
@{ Name = 'devblackops' Types = @{ Directories = @{ symlink = '7373ff' junction = '7373ff' WellKnown = @{ docs = '00BFFF' documents = '00BFFF' desktop = '00FBFF' ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Data/colorThemes/devblackops_light.psd1
PowerShell
mit
2,868
main
19,062
@{ Name = 'devblackops_light' Types = @{ Directories = @{ symlink = '7373ff' junction = '7373ff' WellKnown = @{ docs = '00BFFF' documents = '00BFFF' desktop = '00c9cd' benchmark = 'F08519' ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Data/iconThemes/devblackops.psd1
PowerShell
mit
2,868
main
26,732
@{ Name = 'devblackops' Types = @{ Directories = @{ # Default directory icon '' = 'nf-oct-file_directory' symlink = 'nf-cod-file_symlink_directory' junction = 'nf-fa-external_link' WellKnown = @{ docs ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Import-IconTheme.ps1
PowerShell
mit
2,868
main
275
function Import-IconTheme { [OutputType([hashtable])] [cmdletbinding()] param() $hash = @{} (Get-ChildItem -Path $moduleRoot/Data/iconThemes).ForEach({ $hash.Add($_.Basename, (Import-PowerShellDataFile $_.FullName)) }) $hash }
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/ConvertFrom-RGBColor.ps1
PowerShell
mit
2,868
main
503
function ConvertFrom-RGBColor { [OutputType([string])] [CmdletBinding()] param( [Parameter(Mandatory, ValueFromPipeline)] [ValidateNotNullOrEmpty()] [string]$RGB ) process { $RGB = $RGB.Replace('#', '') $r = [convert]::ToInt32($RGB.SubString(0,2), 16) ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Save-Preferences.ps1
PowerShell
mit
2,868
main
377
function Save-Preferences { [cmdletbinding()] param( [parameter(Mandatory, ValueFromPipeline)] [hashtable]$Preferences, [string]$Path = (Join-Path (Get-ThemeStoragePath) 'prefs.xml') ) process { Write-Debug ('Saving preferendces to [{0}]' -f $Path) $Preferences ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Add-Theme.ps1
PowerShell
mit
2,868
main
3,653
function Add-Theme { [cmdletbinding(DefaultParameterSetName = 'Path', SupportsShouldProcess)] param( [Parameter( Mandatory, ParameterSetName = 'Path', Position = 0, ValueFromPipeline, ValueFromPipelineByPropertyName )] [Validat...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Get-ThemeStoragePath.ps1
PowerShell
mit
2,868
main
711
function Get-ThemeStoragePath { [OutputType([string])] [CmdletBinding()] param() if ($IsLinux -or $IsMacOs) { if (-not ($basePath = $env:XDG_CONFIG_HOME)) { $basePath = [IO.Path]::Combine($HOME, '.local', 'share') } } else { if (-not ($basePath = $env:APPDATA)) {...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/ConvertFrom-ColorEscapeSequence.ps1
PowerShell
mit
2,868
main
518
function ConvertFrom-ColorEscapeSequence { [OutputType([string])] [CmdletBinding()] param( [Parameter(Mandatory, ValueFromPipeline)] [ValidateNotNullOrEmpty()] [string]$Sequence ) process { # Example input sequence: 'e[38;2;135;206;250m' $arr = $Sequence.Spli...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Import-Preferences.ps1
PowerShell
mit
2,868
main
899
function Import-Preferences { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '')] [OutputType([hashtable])] [cmdletbinding()] param( [parameter(ValueFromPipeline)] [string]$Path = (Join-Path (Get-ThemeStoragePath) 'prefs.xml'), ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Import-ColorTheme.ps1
PowerShell
mit
2,868
main
445
function Import-ColorTheme { [OutputType([hashtable])] [cmdletbinding()] param() $hash = @{} (Get-ChildItem -Path $moduleRoot/Data/colorThemes).ForEach({ $colorData = Import-PowerShellDataFile $_.FullName $hash[$colorData.Name] = $colorData $hash[$colorData.Name].Types.Direc...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/ConvertTo-ColorSequence.ps1
PowerShell
mit
2,868
main
1,587
function ConvertTo-ColorSequence { [cmdletbinding()] param( [parameter(Mandatory, ValueFromPipeline)] [hashtable]$ColorData ) process { $cs = New-EmptyColorTheme $cs.Name = $ColorData.Name # Directories if ($ColorData.Types.Directories['symlink']) {...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Set-Theme.ps1
PowerShell
mit
2,868
main
1,008
function Set-Theme { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '')] [CmdletBinding()] param( [Parameter(Mandatory)] [AllowNull()] [AllowEmptyString()] [string]$Name, [ValidateSet('Color', 'Icon')] [Param...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/New-EmptyColorTheme.ps1
PowerShell
mit
2,868
main
627
function New-EmptyColorTheme { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '')] [OutputType([hashtable])] [cmdletbinding()] param() @{ Name = '' Types = @{ Directories = @{ #'' = "`e[0m" ...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Save-Theme.ps1
PowerShell
mit
2,868
main
514
function Save-Theme { [CmdletBinding()] param( [Parameter(Mandatory, ValueFromPipeline)] [hashtable]$Theme, [ValidateSet('color', 'icon')] [string]$Type, [string]$Path = (Get-ThemeStoragePath) ) process { $themePath = Join-Path $Path "$($Theme.Name)_$($...
github
devblackops/Terminal-Icons
https://github.com/devblackops/Terminal-Icons
Terminal-Icons/Private/Resolve-Icon.ps1
PowerShell
mit
2,868
main
5,227
function Resolve-Icon { [OutputType([hashtable])] [CmdletBinding()] param( [Parameter(Mandatory, ValueFromPipeline)] [IO.FileSystemInfo]$FileInfo, [string]$IconTheme = $script:userThemeData.CurrentIconTheme, [string]$ColorTheme = $script:userThemeData.CurrentColorTheme ...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
_Template/Get-Something.ps1
PowerShell
mit
2,846
master
1,428
Function Get-Something { <# .SYNOPSIS A brief description of the Get-Something function. .DESCRIPTION A detailed description of the Get-Something function. .PARAMETER ComputerName A description of the ComputerName parameter. .PARAMETER Credential A description of the Credential parameter. .EXAMP...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
SCSM-Get-SCSMIncidentRequestComment/Get-SCSMIncidentRequestComment.ps1
PowerShell
mit
2,846
master
3,285
function Get-SCSMIncidentRequestComment { <# .SYNOPSIS Function to retrieve the comments from a Incident Request WorkItem .DESCRIPTION Function to retrieve the comments from a Incident Request WorkItem .PARAMETER DateTime Specifies from when (DateTime) the search need to look ...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-PSObjectEmptyOrNullProperty/Get-PSObjectEmptyOrNullProperty.ps1
PowerShell
mit
2,846
master
1,555
function Get-PSObjectEmptyOrNullProperty { <# .SYNOPSIS Function to Get all the empty or null properties with empty value in a PowerShell Object .DESCRIPTION Function to Get all the empty or null properties with empty value in a PowerShell Object. I used this function in a System Center Orchestrator wh...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Remove-HashTableEmptyValue/Remove-HashTableEmptyValue.ps1
PowerShell
mit
2,846
master
1,012
Function Remove-HashTableEmptyValue { <# .SYNOPSIS This function will remove the empty or Null entry of a hashtable object .DESCRIPTION This function will remove the empty or Null entry of a hashtable object .PARAMETER Hashtable Specifies the hashtable that will be cleaned up. .EXAMPLE Remove-HashTa...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-ComputerOS/Get-ComputerOS.ps1
PowerShell
mit
2,846
master
4,096
function Get-ComputerOS { <# .SYNOPSIS function to retrieve the Operating System of a machine .DESCRIPTION function to retrieve the Operating System of a machine .PARAMETER ComputerName Specifies the ComputerName of the machine to query. Default is localhost. .PARAMETER Cr...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-StringLastDigit/Get-StringLastDigit.ps1
PowerShell
mit
2,846
master
1,067
function Get-StringLastDigit { <# .SYNOPSIS Get the last digit of a string .DESCRIPTION Get the last digit of a string using Regular Expression .PARAMETER String Specifies the String to check .EXAMPLE PS C:\> Get-StringLastDigit -String "Francois-Xavier.cat5" 5 .EXAMPLE PS C:\> Get-StringLastDi...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
AD-GPO-Get-ADGPOReplication/AD-GPO-Get-ADGPOReplication.ps1
PowerShell
mit
2,846
master
4,348
function Get-ADGPOReplication { <# .SYNOPSIS This function retrieve one or all the GPO and report their DSVersions and SysVolVersions (Users and Computers) .DESCRIPTION This function retrieve one or all the GPO and report their DSVersions and SysVolVersions (Users and Computers) .PARAMET...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-Uptime/Get-Uptime.ps1
PowerShell
mit
2,846
master
6,532
function Get-Uptime { <# .SYNOPSIS The function Get-Uptime will get uptime of a local or remote machine. .DESCRIPTION The function Get-Uptime will get uptime of a local or remote machine. This function is compatible with CIM sessions and alternative credentials. .PARAMETER ComputerName Specifies the c...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
SCCM-Set-SCCMClientCacheSize/Set-SCCMClientCacheSize.ps1
PowerShell
mit
2,846
master
2,450
function Set-SCCMClientCacheSize { <# .SYNOPSIS Function to set the cache size on a SCCM Client .DESCRIPTION Function to set the cache size on a SCCM Client .PARAMETER ComputerName Specifies the name of the client on which the Cache size need to be changed...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-New-DjoinFile/New-DjoinFile.ps1
PowerShell
mit
2,846
master
2,059
function New-DjoinFile { <# .SYNOPSIS Function to generate a blob file accepted by djoin.exe tool (offline domain join) .DESCRIPTION Function to generate a blob file accepted by djoin.exe tool (offline domain join) This function can create a file compatible with djoin with the Blob...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-ImageInformation/Get-ImageInformation.ps1
PowerShell
mit
2,846
master
728
function Get-ImageInformation { <# .SYNOPSIS function to retrieve Image file information .DESCRIPTION function to retrieve Image file information .PARAMETER FilePath Specify one or multiple image file path(s). .EXAMPLE PS C:\> Get-ImageInformation -FilePath c:\temp\image.png .NOTES Francois-...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
SCCM-Remove-SCCMUserDeviceAffinity/Remove-SCCMUserDeviceAffinity.ps1
PowerShell
mit
2,846
master
2,823
function Remove-SCCMUserDeviceAffinity { <# .SYNOPSIS Function to remove the primary user(s) or group(s) from a device in SCCM .DESCRIPTION Function to remove the primary user(s) or group(s) from a device in SCCM .PARAMETER SiteCode Specifies the SCCM Site Code .PARAMETER ...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Expand-ScriptAlias/Expand-ScriptAlias.ps1
PowerShell
mit
2,846
master
4,607
function Expand-ScriptAlias { <# .SYNOPSIS Function to replace Aliases used in a script by their fullname .DESCRIPTION Function to replace Aliases used in a script by their fullname. Using PowerShell AST we are able to retrieve the functions and cmdlets used in a script. .PARAM...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-NetFrameworkTypeAccelerator/Get-NetFrameworkTypeAccelerator.ps1
PowerShell
mit
2,846
master
773
function Get-NetFrameworkTypeAccelerator { <# .SYNOPSIS Function to retrieve the list of Type Accelerator available .DESCRIPTION Function to retrieve the list of Type Accelerator available .EXAMPLE Get-NetFrameworkTypeAccelerator Return the list of Type Accelerator available on your system .EXAMPL...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Enable-RemoteDesktop/Enable-RemoteDesktop.ps1
PowerShell
mit
2,846
master
7,295
function Enable-RemoteDesktop { <# .SYNOPSIS The function Enable-RemoteDesktop will enable RemoteDesktop on a local or remote machine. .DESCRIPTION The function Enable-RemoteDesktop will enable RemoteDesktop on a local or remote machine. .PARAMETER ComputerName Specifies the co...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
VMWARE-HOST-List_VIB/VMWARE-HOST-List_VIB.ps1
PowerShell
mit
2,846
master
6,330
<# .DESCRIPTION This Script retrieve the VIB information on all the VMware Host .PARAMETER AllVib This is the default parameter to retrieve all the VIBs information .PARAMETER VIBName Specifies a specific VIB Name .PARAMETER VIBVendor Specifies a specific VIB Vendor .EXAMPLE VMWARE-HOST-List_VIB.ps1 -Al...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-HashTableNotEmptyValue/Get-HashTableNotEmptyOrNullValue.ps1
PowerShell
mit
2,846
master
743
Function Get-HashTableNotEmptyOrNullValue { <# .SYNOPSIS This function will get the values that are not empty or Null in a hashtable object .DESCRIPTION This function will get the values that are not empty or Null in a hashtable object .PARAMETER Hashtable Specifies the hashtable that will be showed .EX...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-ConvertTo-Base64/ConvertTo-Base64.ps1
PowerShell
mit
2,846
master
837
function ConvertTo-Base64 { <# .SYNOPSIS Function to convert an image to Base64 .DESCRIPTION Function to convert an image to Base64 .PARAMETER Path Specifies the path of the file .EXAMPLE ConvertTo-Base64 -Path "C:\images\PowerShellLogo.png" .NOTES Fra...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-NetStat/Get-NetStat.ps1
PowerShell
mit
2,846
master
1,486
function Get-NetStat { <# .SYNOPSIS This function will get the output of netstat -n and parse the output .DESCRIPTION This function will get the output of netstat -n and parse the output .EXAMPLE Get-Netstat .LINK https://lazywinadmin.com/2014/08/powershell-parse-this-netstatexe.html .NOTES Fran...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
AZURE-Get-AzureIPRangesAndServiceTags/Get-AzureIPRangesAndServiceTags.ps1
PowerShell
mit
2,846
master
3,509
function Get-AzureIPRangesAndServiceTags { <# .SYNOPSIS Retrieve the Ip address ranges and Service Tags ranges for Azure (Public, USgov, Germnay or China) The function return a Json. This can be passed to '|Converfrom-json' if you wish to get a PowerShell object. This information is pulled from Microsoft Download pag...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Lock-Computer/Lock-Computer.ps1
PowerShell
mit
2,846
master
587
Function Lock-Computer { <# .DESCRIPTION Function to Lock your computer .SYNOPSIS Function to Lock your computer. This is using the win32 user32.dll library. .EXAMPLE Lock-Computer This will lock the current computer .LINK https://github.com/lazywinadmin/PowerShell #> $signature = @" [...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
AD-OBJECT-Get-ADSITokenGroup/Get-ADSITokenGroup.ps1
PowerShell
mit
2,846
master
4,551
function Get-ADSITokenGroup { <# .SYNOPSIS Retrieve the list of group present in the tokengroups of a user or computer object. .DESCRIPTION Retrieve the list of group present in the tokengroups of a user or computer object. TokenGroups attribute https://msdn.microsoft.com/en...
github
lazywinadmin/PowerShell
https://github.com/lazywinadmin/PowerShell
TOOL-Get-BatteryStatus/Get-BatteryStatus.ps1
PowerShell
mit
2,846
master
542
function Get-BatteryStatus { <# .SYNOPSIS Retrieve battery information .DESCRIPTION Retrieve battery information .EXAMPLE Get-BatteryStatus .NOTES http://www.powershellmagazine.com/2012/10/18/pstip-get-system-power-information/ .LINK https://github.com/lazywinadmi...