This python script mints a .ps1 file with an exploitable semicolon condition that allows for command execution from Microsoft Windows PowerShell. This is an updated exploit to work with Python3.
4213f6f37e107f80de8ae921a759ed1c060b04954405f63904e79423474d16ca