<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Powershell on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/powershell/</link><description>Recent content in Powershell on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/powershell/feed.xml" rel="self" type="application/rss+xml"/><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for cybersecurity professionals, detailing methodologies and commands for navigating the Active Directory environment. Its primary use case involves facilitating reconnaissance, privilege escalation, and lateral movement within a network through structured commands using Powershell and .Net. Notable features include a systematic approach to various stages of the exploitation process, including domain enumeration, persistence techniques, and monitoring account vulnerabilities.&lt;/p&gt;</description></item><item><title>bashbunny-payloads</title><link>https://rainmana.github.io/hackyfeed/tools/hak5-bashbunny-payloads/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hak5-bashbunny-payloads/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Bash Bunny Payload Library provides a collection of community-developed payloads and extensions specifically designed for the Hak5 Bash Bunny, utilizing DuckyScript™ and Bash scripting languages. Its primary use case is to enable users to automate various tasks through the intuitive deployment of scripts, with notable features including community contributions and the ability to submit new payloads via pull requests. Additionally, the repository encourages collaboration and offers resources for building payloads through its associated PayloadStudio.&lt;/p&gt;</description></item><item><title>Chimera</title><link>https://rainmana.github.io/hackyfeed/tools/tokyoneon-chimera/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tokyoneon-chimera/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chimera is a PowerShell obfuscation script designed to evade Detection and AMSI mechanisms by transforming potentially malicious PowerShell scripts into less recognizable forms. Its primary use case is for penetration testing and research into bypassing antivirus signatures, utilizing advanced techniques like string substitution and variable concatenation. Notable features include the capability to digest and obfuscate known malicious scripts while effectively bypassing security detection tools, thereby demonstrating the vulnerabilities in existing AV signatures.&lt;/p&gt;</description></item><item><title>K8tools</title><link>https://rainmana.github.io/hackyfeed/tools/k8gege-k8tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/k8gege-k8tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; K8tools is a collection of security research and penetration testing tools designed for use in various environments, including remote command execution and web shells. Notably, these tools are modified to enhance compatibility and stability, catering to security professionals who require reliable functionalities. The repository serves as a hub for downloading tools, accessing documentation, and submitting feedback for continuous improvement.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="k8tools"&gt;K8tools&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/k8gege"&gt;&lt;img src="https://img.shields.io/badge/Author-k8gege-blueviolet" alt="Author"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/issues"&gt;&lt;img src="https://img.shields.io/github/issues/k8gege/K8tools" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/k8gege/K8tools" alt="Github Stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/k8gege/K8tools" alt="GitHub forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/k8gege/K8tools" alt="GitHub license"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="http://k8gege.org/k8img/title/gun5.jpg" alt="image"&gt;&lt;/p&gt;
&lt;p&gt;声明: 工具仅供安全研究或授权渗透，非法用途后果自负。&lt;br&gt;
下载: &lt;a href="https://github.com/k8gege/K8tools"&gt;https://github.com/k8gege/K8tools&lt;/a&gt;&lt;br&gt;
文档: &lt;a href="http://k8gege.org/p/72f1fea6.html"&gt;http://k8gege.org/p/72f1fea6.html&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</description></item><item><title>monkey365</title><link>https://rainmana.github.io/hackyfeed/tools/silverhack-monkey365/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/silverhack-monkey365/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Monkey365 is an open-source PowerShell module designed for security configuration reviews of Microsoft 365, Azure, and Microsoft Entra ID environments. It enables users to identify potential security misconfigurations and provides actionable recommendations for compliance with best practices. Notable features include its user-friendly approach that minimizes the need for in-depth knowledge of APIs and complex dashboards while facilitating comprehensive scans for security gaps.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/5271640/181045413-1d17333c-0533-404a-91be-2070ccc6ee29.png" width="500" height="600" /&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="License" src="https://img.shields.io/github/license/silverhack/monkey365"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="Pester" src="https://github.com/silverhack/monkey365/actions/workflows/pester.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="ScriptAnalyzer" src="https://github.com/silverhack/monkey365/actions/workflows/scriptanalyzer.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="Lines" src="https://img.shields.io/endpoint?url=https://ghloc.vercel.app/api/silverhack/monkey365/badge?filter=.ps1$,.psm1$&amp;style=flat&amp;logoColor=white&amp;label=Lines%20of%20Code"&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/tr1ana"&gt;&lt;img alt="Twitter" src="https://img.shields.io/twitter/follow/tr1ana?style=social"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365/releases"&gt;&lt;img alt="GitHub Downloads" src="https://img.shields.io/github/downloads/silverhack/monkey365/total?style=flat&amp;logo=powershell&amp;label=GitHub%20Release%20Download"&gt;&lt;/a&gt;
 &lt;a href="https://www.powershellgallery.com/packages/monkey365"&gt;&lt;img alt="PowerShell Gallery" src="https://img.shields.io/powershellgallery/v/monkey365.svg?label=latest+version"&gt;&lt;/a&gt;
 &lt;a href="https://www.powershellgallery.com/packages/monkey365"&gt;&lt;img alt="PowerShell Gallery Downloads" src="https://img.shields.io/powershellgallery/dt/monkey365.svg?style=flat&amp;logo=powershell&amp;label=PSGallery%20Download"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>nishang</title><link>https://rainmana.github.io/hackyfeed/tools/samratashok-nishang/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samratashok-nishang/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nishang is a comprehensive PowerShell framework designed for offensive security, penetration testing, and red teaming, featuring a collection of scripts and payloads that assist in various stages of penetration testing. It allows users to execute scripts in memory to bypass antivirus detection and includes notable functionalities such as encoding commands, webshell capabilities, and Active Directory manipulation tools. The framework is structured for ease of use with PowerShell, offering detailed help for individual scripts and versatile execution methods.&lt;/p&gt;</description></item><item><title>o365recon</title><link>https://rainmana.github.io/hackyfeed/tools/nyxgeek-o365recon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nyxgeek-o365recon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; o365recon is a PowerShell script designed for retrieving information from Office 365 and Azure AD using valid credentials. Its primary use case is to facilitate information gathering for security assessments, with a notable feature allowing optional Azure querying through a simple command-line interface. The tool requires the installation of MSOnline and AzureAD modules and includes support for multi-factor authentication.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="o365recon"&gt;o365recon&lt;/h1&gt;
&lt;p&gt;script to retrieve information via O365 and AzureAD with a valid cred&lt;/p&gt;</description></item><item><title>OSCP</title><link>https://rainmana.github.io/hackyfeed/tools/0xsyr0-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsyr0-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Cheat Sheet repository provides a comprehensive collection of essential commands and techniques specifically tailored for the Offensive Security Certified Professional (OSCP) exam. It includes updates on advanced exploitation methods such as Active Directory Certificate Services abuse and Shadow Credentials attacks, alongside practical resources for information gathering, vulnerability analysis, and exploitation strategies. The tool aims to assist users in navigating the exam requirements while emphasizing the importance of adhering to current exam guidelines.&lt;/p&gt;</description></item><item><title>Penetration-Testing-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Tools repository is a comprehensive collection of over 160 scripts, utilities, and cheatsheets designed for Penetration Testing and IT security audits. It encompasses a wide range of categories including cloud assessments, network protocols, web security, and red teaming, enabling practitioners to increase efficiency and improve technical assurance in their engagements. Notable features include modular organization by function, a focus on real-world applicability, and the absence of sensitive client-specific information.&lt;/p&gt;</description></item><item><title>PowerHub</title><link>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerHub is a post-exploitation tool designed for PowerShell, facilitating the transfer of potentially flagged data during penetration testing engagements. Its notable features include being fileless and stateless, utilizing cert pinning and RC4 encryption for string obfuscation, allowing seamless execution of C# programs in memory, and offering multiple methods to bypass AMSI. The tool simplifies processes such as running scripts and transferring sensitive information like Kerberos tickets or passwords, either through command line or a web interface, enhancing collaboration for testing teams.&lt;/p&gt;</description></item><item><title>PowerShell-for-Hackers</title><link>https://rainmana.github.io/hackyfeed/tools/i-am-jakoby-powershell-for-hackers/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/i-am-jakoby-powershell-for-hackers/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerShell for Hackers is a repository of customizable PowerShell functions designed to aid in developing payloads for security testing and ethical hacking. Key features include a variety of functions with descriptions, usage examples, and accompanying video tutorials, which facilitate the creation of payloads for diverse scenarios such as system manipulation, desktop interactions, and data concealment. This collection emphasizes community collaboration, allowing users to contribute their own functions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;&lt;h3&gt;2022 Hak5 hacker of the Year&lt;/h3&gt;&lt;/div&gt;
&lt;p&gt;&lt;img src="https://github.com/I-Am-Jakoby/I-Am-Jakoby/raw/main/img/hak5-banner.png" alt="hak 5"&gt;&lt;/p&gt;</description></item><item><title>PrivescCheck</title><link>https://rainmana.github.io/hackyfeed/tools/itm4n-privesccheck/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/itm4n-privesccheck/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PrivescCheck is a PowerShell script designed for identifying common Windows vulnerabilities and configuration issues outside the scope of public security standards, facilitating exploitation and post-exploitation tasks. It allows users to run various checks—including basic, extended, and audit checks—generate human-readable reports in multiple formats (TXT, HTML, CSV, XML), and includes options for silent execution and risky checks, making it suitable for penetration testing, research, and auditing purposes. Notably, the tool performs context-aware access control checks to provide accurate findings based on the current user&amp;rsquo;s privileges.&lt;/p&gt;</description></item><item><title>PsMapExec</title><link>https://rainmana.github.io/hackyfeed/tools/the-viper-one-psmapexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-viper-one-psmapexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PsMapExec is a PowerShell-based post-exploitation framework designed to facilitate penetration testing within Active Directory environments. It offers enhancements over similar tools like CrackMapExec and NetExec, allowing for comprehensive Active Directory enumeration and management with a user-friendly interface. The tool is self-contained, making it suitable for use in restricted environments, and emphasizes adherence to ethical guidelines and consent when utilized for security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="psmapexec"&gt;PsMapExec&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/user-attachments/assets/e471dc70-a4a1-4c5d-8c81-2a67a2927b3a" 
 width="450" 
 alt="PME_Logo"
 style="border:1px solid #ddd; border-radius:8px; box-shadow:2px 2px 10px rgba(0,0,0,0.1);"&gt;
&lt;/p&gt;</description></item><item><title>redsnarf</title><link>https://rainmana.github.io/hackyfeed/tools/nccgroup-redsnarf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nccgroup-redsnarf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedSnarf is a penetration testing and red team tool designed for the extraction of hashes and credentials from Windows environments, including workstations, servers, and domain controllers, utilizing operationally safe techniques. Key features include the retrieval of local SAM hashes, enumeration of users with elevated privileges, and capabilities for hash spraying, LSASS dumps, and remote management functions like enabling/disabling RDP and clearing event logs. The tool focuses on efficient credential collection and strengthening post-exploitation analysis while maintaining a low profile during operations.&lt;/p&gt;</description></item><item><title>RedTeaming-Tactics-and-Techniques</title><link>https://rainmana.github.io/hackyfeed/tools/mantvydasb-redteaming-tactics-and-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mantvydasb-redteaming-tactics-and-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; This repository contains personal notes focused on red teaming and offensive security, emphasizing practical experiments with various penetration testing techniques and tools in a controlled lab environment. It covers a range of methodologies, including code execution, defense evasion, and lateral movement, while aiming to enhance understanding of cyber attacks and malware development. Notable features include a commitment to referencing other researchers&amp;rsquo; work and a critical approach to self-learning through experimentation and documentation.&lt;/p&gt;</description></item><item><title>SessionGopher</title><link>https://rainmana.github.io/hackyfeed/tools/arvanaghi-sessiongopher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arvanaghi-sessiongopher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SessionGopher is a PowerShell-based tool designed to retrieve and decrypt saved session information from remote access applications like PuTTY, WinSCP, FileZilla, and RDP. Its primary use case is for security assessments to identify systems that may connect to sensitive environments such as Unix systems or remote desktops. Notable features include thorough filesystem searches for private key files and the ability to run queries across multiple hosts or domain-joined systems, with results conveniently outputted to CSV files.&lt;/p&gt;</description></item><item><title>SkyArk</title><link>https://rainmana.github.io/hackyfeed/tools/cyberark-skyark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyberark-skyark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SkyArk is a cloud security tool that focuses on detecting and mitigating the threat of Cloud Shadow Admins in AWS and Azure environments through its two main scanning modules: AWStealth and AzureStealth. It identifies the most privileged cloud users and helps organizations ensure these entities are secured with best practices such as strong credentials and MFA. Notably, SkyArk enables risk assessment by uncovering hidden admin accounts that may escalate privileges if left unmanaged.&lt;/p&gt;</description></item><item><title>sysmon-modular</title><link>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sysmon-modular is a modular Sysmon configuration repository designed for customization and maintenance of Microsoft Sysinternals&amp;rsquo; Sysmon tool. Its primary use case is to generate tailored event logging configurations for monitoring system behavior and enhancing threat detection in diverse environments. Notable features include pre-generated configurations catering to different verbosity levels, a flexible module system for incorporating custom configurations, and automated XML generation through a PowerShell script integrated with Azure Pipelines.&lt;/p&gt;</description></item><item><title>Windows-Local-Privilege-Escalation-Cookbook</title><link>https://rainmana.github.io/hackyfeed/tools/nickvourd-windows-local-privilege-escalation-cookbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nickvourd-windows-local-privilege-escalation-cookbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Windows Local Privilege Escalation Cookbook is designed to educate users on local privilege escalation techniques within Windows environments, focusing on exploiting misconfiguration vulnerabilities. It provides structured guidance, including sections on description, lab setup, enumeration, exploitation, and mitigation for various vulnerabilities, while also emphasizing ethical usage and the need for responsible application of the techniques outlined. Notably, it excludes evasion tactics and includes a PowerShell script for disabling Windows Defender under specific conditions.&lt;/p&gt;</description></item><item><title>WinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WinPwn is a comprehensive PowerShell-based tool designed for internal penetration testing, emphasizing automation and proxy support for reconnaissance and exploitation tasks. Its notable features include modules for session management, credential dumping, local and domain reconnaissance, and privilege escalation checks, alongside the ability to operate offline and integrate well-known offensive security scripts. The tool streamlines the penetration testing process with an interactive menu for selecting various attack methods and extensive built-in reconnaissance capabilities.&lt;/p&gt;</description></item><item><title>xencrypt</title><link>https://rainmana.github.io/hackyfeed/tools/the-xentropy-xencrypt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-xentropy-xencrypt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Xencrypt is a PowerShell-based crypter designed to compress and encrypt PowerShell scripts while bypassing AMSI and modern antivirus solutions. Its notable features include variable name randomization, support for recursive layering of encrypted scripts, and a minimal overhead due to compression. This open-source tool serves as a demonstration for users looking to develop their own crypters, offering flexibility for customization and ease of use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xencrypt"&gt;Xencrypt&lt;/h1&gt;
&lt;h3 id="powershell-crypter-v-10"&gt;PowerShell crypter v 1.0&lt;/h3&gt;
&lt;h2 id="authors"&gt;Authors&lt;/h2&gt;
&lt;p&gt;Xentropy ( &lt;a href="http://twitter.com/SamuelAnttila"&gt;@SamuelAnttila&lt;/a&gt; )&lt;br&gt;
SecForce ( &lt;a href="http://twitter.com/SECFORCE_LTD"&gt;@SECFORCE_LTD&lt;/a&gt; )&lt;/p&gt;</description></item></channel></rss>