I hereby claim:
- I am 0x11dfe on github.
- I am t3sl4 (https://keybase.io/t3sl4) on keybase.
- I have a public key ASA_Utk8EeOZS0c5qKUC_JoZyik-NjLjrvmXVhCyXODhdgo
To claim this, I am signing this object:
## | |
# - @T3SL4 | |
# This PowerShell script is used to manage the permissions of a folder for the current user. | |
# It first prompts the user to input the folder path and then asks whether they want to do. | |
# This can be useful for protecting sensitive folders from accidental modification or deletion. | |
## | |
$folderPath = Read-Host -Prompt 'Input your folder path'; $username = whoami; $action = Read-Host -Prompt "(1) Block current-user from deleting, modifying, or renaming folder.`n(2) Restore current-user access?`nEnter the number"; if ($action -eq 1) { takeown /F $folderPath /A /R /D Y; icacls $folderPath /inheritance:r; icacls $folderPath /grant:r $username':(RX)' /T; icacls $folderPath /deny $username':(WD,AD,DC,WDAC,WO,WD)'; attrib +r $folderPath /S /D } else { icacls $folderPath /grant:r $username':(M)' /T; attrib -r $folderPath /S /D } |
### | |
# - @T3SL4 | |
# This script automates the HVCI scan and removal of unsafe drivers. | |
### | |
# Ensure the script runs with administrative privileges | |
if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { | |
Write-Host "Running script as administrator..." -ForegroundColor Cyan | |
Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs | |
exit |
I hereby claim:
To claim this, I am signing this object: