Figure-3-Fully-weaponised-PowerShell-session