<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>powershellmanager</title><link>https://evotec.xyz/es/tags/powershellmanager</link><description>Evotec Main Website</description><atom:link href="https://evotec.xyz/es/tags/powershellmanager/index.xml" rel="self" type="application/rss+xml" /><item><title>Restoring (Recovering) PowerShell Scripts from Event Logs</title><link>https://evotec.xyz/es/blog/restoring-recovering-powershell-scripts-from-event-logs</link><description>A few days ago, I was asked to take a look at PowerShell Malware. While I don’t know much about malware, my curiosity didn’t let me skip on this occasion, and I was handed over WindowsPowerShell.evtx file. Ok, that’s not what I expected! I wanted PowerShell .ps1 files that I can read and assess? Well, you play with the cards you were dealt with. What I was handed over was PowerShell Event Log. PowerShell writes whatever you execute, and it thinks it is risky, to Windows PowerShell Operation Event Log.</description><pubDate>Fri, 28 Aug 2020 15:39:28 GMT</pubDate><guid>https://evotec.xyz/es/blog/restoring-recovering-powershell-scripts-from-event-logs</guid><category>event log</category><category>get-events</category><category>powershell</category><category>powershellmanager</category><category>pseventviewer</category><category>Windows</category></item></channel></rss>