# Page Not Found

The URL `oscp-notes-include-active-directory-2023/antivirus-evasion/using-script-in-powershell` does not exist.

You might be looking for one of these pages:
- [Using script in powershell](https://hackervegas001.gitbook.io/hackervegas001/oscp-notes/antivirus-evasion/using-script-in-powershell.md)
- [Using Shellter Tool](https://hackervegas001.gitbook.io/hackervegas001/oscp-notes/antivirus-evasion/using-shellter-tool.md)
- [Veil tool](https://hackervegas001.gitbook.io/hackervegas001/oscp-notes/antivirus-evasion/veil-tool.md)
- [msfvenom payload for powershell](https://hackervegas001.gitbook.io/hackervegas001/oscp-notes/tools/msfvenom-payload-for-powershell.md)
- [AS-REP Roasting](https://hackervegas001.gitbook.io/hackervegas001/oscp-notes/active-directory/authentication/as-rep-roasting.md)

## How to find the correct page

1. **Browse the full index**: [/sitemap.md](https://hackervegas001.gitbook.io/hackervegas001/sitemap.md) - Complete documentation index
2. **View the full content**: [/llms-full.txt](https://hackervegas001.gitbook.io/hackervegas001/llms-full.txt) - Full content export

## Tips for requesting documentation

- For markdown responses, append `.md` to URLs (e.g., `/hackervegas001/oscp-notes/antivirus-evasion/using-script-in-powershell.md`)
- Use `Accept: text/markdown` header for content negotiation