Notes/Pentesting with PowerShell

Pentesting with PowerShell

PowerShell has become extremely popular among hackers over the years. It is important and highly useful for penetration testers and ethical hackers. PowerShell is easy to learn and provides access to almost everything in Windows systems, opening up a large attack surface to execute many attack possibilities.

Here are the notes I jotted down while completing the course "Hands-On Penetration Testing with PowerShell" by EC-Council.


##List of Learning Paths

Learning Path NameLecture NumberDescription
PowerShell Introduction & Basics1Starting out by understanding the basics of Windows PowerShell.
PowerShell Scripting2Scripting basic programs with PowerShell.
Reconnaissance & Scanning3Reconnaissance using PowerShell.
Active Directory - Part 14Using PowerShell to exploit Active Directory (Part 1).
Active Directory - Part 25Using PowerShell to exploit Active Directory (Part 2).
PowerShell and Metasploit6Using PowerShell with Metasploit to perform exploits.
Backdoors, Lateral Movement, and Persistence7Basic understanding of backdoors, lateral movement, and persistence.

Some Powershell Scripts I wrote down during this course (Educational Purpose Only!!) -


$ echo "Open to collaborations, research, and security engineering work."

> Open to collaborations, research, and security engineering work.

$ uptime

> Portfolio online since 2024 | Last updated: Feb 2026

"No one is useless in this world who lightens the burdens of another." — Charles Dickens

Considered a small donation if you found any of the walkthrough or blog posts helpful. Much appreciate :)

Buy me a coffee

© 2026 Shivang Tiwari. Built with Next.js. Hack the planet.