@abtnode/router-provider 1.16.38-beta-20250115-235439-bb5a1c1b → 1.16.38-beta-20250118-033334-2da05ae8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/lib/nginx/includes/security/crs4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example +200 -0
  2. package/lib/nginx/includes/security/crs4/rules/REQUEST-901-INITIALIZATION.conf +470 -0
  3. package/lib/nginx/includes/security/crs4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf +57 -0
  4. package/lib/nginx/includes/security/crs4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf +76 -0
  5. package/lib/nginx/includes/security/crs4/rules/REQUEST-913-SCANNER-DETECTION.conf +86 -0
  6. package/lib/nginx/includes/security/crs4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf +1915 -0
  7. package/lib/nginx/includes/security/crs4/rules/REQUEST-921-PROTOCOL-ATTACK.conf +558 -0
  8. package/lib/nginx/includes/security/crs4/rules/REQUEST-922-MULTIPART-ATTACK.conf +120 -0
  9. package/lib/nginx/includes/security/crs4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf +203 -0
  10. package/lib/nginx/includes/security/crs4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf +189 -0
  11. package/lib/nginx/includes/security/crs4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf +1875 -0
  12. package/lib/nginx/includes/security/crs4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf +774 -0
  13. package/lib/nginx/includes/security/crs4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf +366 -0
  14. package/lib/nginx/includes/security/crs4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf +1071 -0
  15. package/lib/nginx/includes/security/crs4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf +1978 -0
  16. package/lib/nginx/includes/security/crs4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf +132 -0
  17. package/lib/nginx/includes/security/crs4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf +463 -0
  18. package/lib/nginx/includes/security/crs4/rules/REQUEST-949-BLOCKING-EVALUATION.conf +270 -0
  19. package/lib/nginx/includes/security/crs4/rules/RESPONSE-950-DATA-LEAKAGES.conf +156 -0
  20. package/lib/nginx/includes/security/crs4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf +417 -0
  21. package/lib/nginx/includes/security/crs4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf +108 -0
  22. package/lib/nginx/includes/security/crs4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf +158 -0
  23. package/lib/nginx/includes/security/crs4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf +152 -0
  24. package/lib/nginx/includes/security/crs4/rules/RESPONSE-955-WEB-SHELLS.conf +558 -0
  25. package/lib/nginx/includes/security/crs4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf +280 -0
  26. package/lib/nginx/includes/security/crs4/rules/RESPONSE-980-CORRELATION.conf +138 -0
  27. package/lib/nginx/includes/security/crs4/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example +76 -0
  28. package/lib/nginx/includes/security/crs4/rules/iis-errors.data +59 -0
  29. package/lib/nginx/includes/security/crs4/rules/java-classes.data +64 -0
  30. package/lib/nginx/includes/security/crs4/rules/java-code-leakages.data +17 -0
  31. package/lib/nginx/includes/security/crs4/rules/java-errors.data +10 -0
  32. package/lib/nginx/includes/security/crs4/rules/lfi-os-files.data +722 -0
  33. package/lib/nginx/includes/security/crs4/rules/php-config-directives.data +571 -0
  34. package/lib/nginx/includes/security/crs4/rules/php-errors-pl2.data +7 -0
  35. package/lib/nginx/includes/security/crs4/rules/php-errors.data +2147 -0
  36. package/lib/nginx/includes/security/crs4/rules/php-function-names-933150.data +245 -0
  37. package/lib/nginx/includes/security/crs4/rules/php-function-names-933151.data +2201 -0
  38. package/lib/nginx/includes/security/crs4/rules/php-variables.data +30 -0
  39. package/lib/nginx/includes/security/crs4/rules/restricted-files.data +284 -0
  40. package/lib/nginx/includes/security/crs4/rules/restricted-upload.data +177 -0
  41. package/lib/nginx/includes/security/crs4/rules/scanners-user-agents.data +119 -0
  42. package/lib/nginx/includes/security/crs4/rules/sql-errors.data +172 -0
  43. package/lib/nginx/includes/security/crs4/rules/ssrf.data +177 -0
  44. package/lib/nginx/includes/security/crs4/rules/unix-shell.data +670 -0
  45. package/lib/nginx/includes/security/crs4/rules/web-shells-php.data +167 -0
  46. package/lib/nginx/includes/security/crs4/rules/windows-powershell-commands.data +425 -0
  47. package/lib/nginx/includes/security/unicode.mapping +96 -0
  48. package/lib/nginx/index.js +50 -3
  49. package/lib/nginx/templates/security/crs4/crs-setup.conf.js +857 -0
  50. package/lib/nginx/templates/security/modsecurity.conf.js +244 -0
  51. package/package.json +7 -6
@@ -0,0 +1,167 @@
1
+ # This list contains patterns of various web shells, backdoors and similar
2
+ # software written in PHP language. There is no way how to automatically update
3
+ # this list, so it must be done by hand. Here is a recommended way how to add
4
+ # new malicious software:
5
+ # 1.) As patterns are matched against RESPONSE_BODY, you need to run a malicious
6
+ # software (ideally in an isolated environment) and catch the output.
7
+ # 2.) In the output, search for static pattern unique enough to match only
8
+ # the software in question and to not do any FPs. The best pick is usually
9
+ # a part of HTML code with software name.
10
+ # 3.) Include software name and URL (if available) in the comment above
11
+ # the pattern.
12
+ #
13
+ # Data comes from multiple places of which some doesn't work anymore. Few are
14
+ # listed below:
15
+ # - https://github.com/JohnTroony/php-webshells/tree/master/Collection
16
+ # - https://www.localroot.net/
17
+ # - Google search (keywords like webshells, php backdoor and similar)
18
+
19
+ # 1n73ction web shell
20
+ <title>=[ 1n73ct10n privat shell ]=</title>
21
+ # Ajax/PHP Command Shell web shell
22
+ >Ajax/PHP Command Shell<
23
+ # AK-74 Security Team Web-shell
24
+ .:: :[ AK-74 Security Team Web-shell ]: ::.
25
+ # ALFA-SHELL web shell (deprecated, https://github.com/solevisible)
26
+ ~ ALFA TEaM Shell -
27
+ # Andela Yuwono Priv8 Shell web shell
28
+ <title>--==[[ Andela Yuwono Priv8 Shell ]]==--</title>
29
+ # Ani-Shell web shell (https://ani-shell.sourceforge.net/)
30
+ <title>Ani-Shell | India</title>
31
+ # AnonymousFox PHP web shell
32
+ <input type='submit' value='file' /></form>AnonymousFox
33
+ # Antichat Shell web shell
34
+ - Antichat Shell</title>
35
+ # AYT web shell
36
+ Ayyildiz Tim | AYT
37
+ # b374k web shell (https://github.com/b374k/b374k)
38
+ <link rel='SHORTCUT ICON' href='data:image/png;base64,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'>
39
+ # BloodSecurity Hackers Shell web shell
40
+ <title>BloodSecurity Hackers Shell</title>
41
+ # Bypass Attack Shell web shell
42
+ <font color='red' size='6px' face='Fredericka the Great'> Bypass Attack Shell </font>
43
+ # c0derz shell web shell
44
+ title='.::[c0derz shell]::.'>
45
+ # C99Shell + N3tShell web shell
46
+ <font face=Webdings size=6><b>!</b></font>
47
+ # Con7ext Shell V.2 web shell
48
+ <title>Con7ext Shell V.2</title>
49
+ # Crystal shell web shell
50
+ <font face="Wingdings 3" size="5">y</font><b>Crystal shell v.
51
+ # Unknown (probably private) web shell
52
+ <title>CUPLIS BYPASSS SHELL</title>
53
+ # CWShell web shell
54
+ ~ CWShell ~</font></a>
55
+ # dC3 Security Crew web shell
56
+ &dir&pic=o.b height= width=>
57
+ # Defacing Tool Pro web shell
58
+ <b>[ Defacing Tool Pro v
59
+ # Dive Shell web shell
60
+ <title>Dive Shell - Emperor Hacking Team</title>
61
+ # easy simple php web shell
62
+ <script>document.getElementById("cmd").focus();</script>
63
+ # ex0 shell web shell
64
+ color=DeepSkyBlue size=6> ## ex0 shell
65
+ # FaTaLSheLL web shell
66
+ <p align="center" class="style4">FaTaLSheLL v
67
+ # G-Security Webshell
68
+ <title>G-Security Webshell</title>
69
+ # Gecko web shell
70
+ <title>Gecko [
71
+ # h4ntu shell web shell
72
+ <title>h4ntu shell [powered by tsoi]</title>
73
+ # IDBTEAM SHELLS file manager
74
+ <H1><center>-=[+] IDBTEAM SHELLS
75
+ # IndoXploit web shell
76
+ <title>IndoXploit</title>
77
+ # KA_uShell web shell
78
+ <KAdot Universal Shell> |
79
+ ## Laudanum PHP Web Shells (http://sourceforge.net/projects/laudanum)
80
+ # Laudanum dns.php
81
+ <title>Laudanum PHP DNS Access</title>
82
+ # Laudanum file.php
83
+ <title>Laudanum PHP File Browser</title>
84
+ # Laudanum host.php
85
+ <title>Laudanum PHP Hostname by IP Lookup</title>
86
+ # Laudanum proxy.php
87
+ <title>Laudanum PHP Proxy</title>
88
+ # Laudanum shell.php
89
+ <title>Laudanum PHP Shell Access</title>
90
+ ## Laudanum WordPress Plugin settings.php
91
+ <h2>Laudanum Tools</h2>
92
+ # Lifka Shell web shell
93
+ >LIFKA SHELL</span></big></big></big></a>
94
+ # Loader'z web shell
95
+ <title>Loader'z WEB shell</title>
96
+ # Locus7Shell web shell
97
+ b>--[ x2300 Locus7Shell v.
98
+ # Lolipop web shell
99
+ <title>Lolipop.php - Edited By KingDefacer -
100
+ # MARIJUANA web shell (https://0x5a455553.github.io/MARIJUANA/)
101
+ <link rel="icon" href="//0x5a455553.github.io/MARIJUANA/icon.png" />
102
+ # Matamu Mat web shell
103
+ <title> Matamu Mat </title>
104
+ # MyShell web shell
105
+ <b>MyShell</b> &copy;2001 Digitart Producciones</a>
106
+ # NCC Shell web shell
107
+ <h1>.:NCC:. Shell v
108
+ # PHPShell by Macker web shell
109
+ <font size=3>PHPShell by Macker - Version
110
+ # PHPShell by MAX666 web shell
111
+ PHPShell by MAX666, Private Exploit, For Server Hacking
112
+ # qsd web shell
113
+ <form action="" METHOD="GET" >Execute Shell Command (safe mode is off): <input type="text" name="c"><input type="submit" value="Go"></form>
114
+ # Rootshell web shell
115
+ <p align="center"><font face="Verdana" size="2">Rootshell v
116
+ # rusuh web shell
117
+ <font color=lime>./rusuh</font>
118
+ # Safe0ver web shell
119
+ <font color="navy"><strong>##Safe0ver##</strong></font>
120
+ # Shany's web shell
121
+ <center><h1>Watch Your system Shany was here.</h1></center><center><h1>Linux Shells</h1></center><hr><hr>
122
+ # Simple PHP backdoor web shell
123
+ <!-- Simple PHP backdoor by DK
124
+ # SimShell web shell
125
+ <title>SimShell - Simorgh Security MGZ</title>
126
+ # Sincap web shell
127
+ <title>:: AventGrup ::.. - Sincap
128
+ # Small Shell file manager
129
+ <title>Small Shell - Edited By KingDefacer</title>
130
+ # Small Web Shell
131
+ <title>small web shell by zaco
132
+ # SoldiersofAllah Private Shell web shell
133
+ <title>SoldiersofAllah Private Shell |
134
+ # Sosyete web shell
135
+ <title>Sosyete Safe Mode Bypass Shell -
136
+ # STNC WebShell
137
+ &nbsp;&nbsp;STNC&nbsp;WebShell&nbsp;
138
+ # StresBypass shell web shell
139
+ <font face="Wingdings 3" size="5">y</font><b>StresBypass<span lang="en-us">v
140
+ # SyRiAn Sh3ll web shell
141
+ <title>SyRiAn Sh3ll ~
142
+ # Tiny File Manager
143
+ <title>Tiny File Manager</title>
144
+ # Turk Shell web shell
145
+ <head><title>Wardom | Ne Mutlu T
146
+ # Unknown web shell
147
+ <hr>to browse go to http://?d=[directory here]
148
+ # Ustadcage48 Filemanager
149
+ <font color="red">USTADCAGE_48</font> <font color="dodgerblue">FILE MANAGER</font>
150
+ # WebRoot Hack Tools shell
151
+ <title>WebRoot Hack Tools</title>
152
+ # web shell by BLaSTER
153
+ <div align="center"><span class="style6">By BLaSTER</span><br />
154
+ # WinX Shell web shell
155
+ <head><title>-:[GreenwooD]:- WinX Shell</title>
156
+ # wwwolf web shell
157
+ <sup><a href="#" onclick="cmd.value=''; cmd.focus(); return false;">Clear cmd</a></sup>
158
+ # Yourman.sh Mini Shell web shell
159
+ <title>Yourman.sh Mini Shell</title>
160
+ # Zerion Mini Shell web shell
161
+ </div><center><br />Zerion Mini Shell <font color=
162
+ # Zero Byte Mini Shell V2 web shell
163
+ <title>0byt3m1n1-V2</title>
164
+ # Zerostore web shell
165
+ <title>ZEROSHELL | ZEROSTORE</title>
166
+ # Unknown web shell
167
+ <input type=submit name=find value='find writeable'>
@@ -0,0 +1,425 @@
1
+ # Sources:
2
+ # Microsoft PowerShell Docs: https://github.com/MicrosoftDocs/PowerShell-Docs
3
+ # - curl -H "Accept: application/vnd.github.v3+json" https://api.github.com/repos/MicrosoftDocs/PowerShell-Docs/git/trees/main\?recursive\=1 | jq -r '.tree[] .path | capture("reference/\\d.\\d/(.*)/(?<fn>[A-Z]\\w+-\\w+).md") | .fn' | sort | uniq
4
+
5
+ powershell
6
+ Add-Computer
7
+ Add-Content
8
+ Add-History
9
+ Add-JobTrigger
10
+ Add-LocalGroupMember
11
+ Add-Member
12
+ Add-PSSnapin
13
+ Add-Type
14
+ Checkpoint-Computer
15
+ Clear-Content
16
+ Clear-EventLog
17
+ Clear-History
18
+ Clear-Host
19
+ Clear-Item
20
+ Clear-ItemProperty
21
+ Clear-RecycleBin
22
+ Clear-Variable
23
+ Compare-Object
24
+ Complete-Transaction
25
+ Compress-Archive
26
+ Connect-PSSession
27
+ Connect-WSMan
28
+ Convert-Path
29
+ Convert-String
30
+ ConvertFrom-Csv
31
+ ConvertFrom-Json
32
+ ConvertFrom-Markdown
33
+ ConvertFrom-SddlString
34
+ ConvertFrom-SecureString
35
+ ConvertFrom-String
36
+ ConvertFrom-StringData
37
+ ConvertTo-Csv
38
+ ConvertTo-Html
39
+ ConvertTo-Json
40
+ ConvertTo-SecureString
41
+ ConvertTo-Xml
42
+ Copy-Item
43
+ Copy-ItemProperty
44
+ Debug-Job
45
+ Debug-Process
46
+ Debug-Runspace
47
+ Disable-ComputerRestore
48
+ Disable-ExperimentalFeature
49
+ Disable-JobTrigger
50
+ Disable-LocalUser
51
+ Disable-PSBreakpoint
52
+ Disable-PSRemoting
53
+ Disable-PSSessionConfiguration
54
+ Disable-PSTrace
55
+ Disable-PSWSManCombinedTrace
56
+ Disable-RunspaceDebug
57
+ Disable-ScheduledJob
58
+ Disable-WSManCredSSP
59
+ Disable-WSManTrace
60
+ Disconnect-PSSession
61
+ Disconnect-WSMan
62
+ Enable-ComputerRestore
63
+ Enable-ExperimentalFeature
64
+ Enable-JobTrigger
65
+ Enable-LocalUser
66
+ Enable-PSBreakpoint
67
+ Enable-PSRemoting
68
+ Enable-PSSessionConfiguration
69
+ Enable-PSTrace
70
+ Enable-PSWSManCombinedTrace
71
+ Enable-RunspaceDebug
72
+ Enable-ScheduledJob
73
+ Enable-WSManCredSSP
74
+ Enable-WSManTrace
75
+ Enter-PSHostProcess
76
+ Enter-PSSession
77
+ Exit-PSHostProcess
78
+ Exit-PSSession
79
+ Expand-Archive
80
+ Export-Alias
81
+ Export-BinaryMiLog
82
+ Export-Clixml
83
+ Export-Console
84
+ Export-Counter
85
+ Export-Csv
86
+ Export-FormatData
87
+ Export-ModuleMember
88
+ Export-ODataEndpointProxy
89
+ Export-PSSession
90
+ Find-Command
91
+ Find-DscResource
92
+ Find-Module
93
+ Find-Package
94
+ Find-PackageProvider
95
+ Find-RoleCapability
96
+ Find-Script
97
+ ForEach-Object
98
+ Format-Custom
99
+ Format-Hex
100
+ Format-List
101
+ Format-Table
102
+ Format-Wide
103
+ Get-Acl
104
+ Get-Alias
105
+ Get-AuthenticodeSignature
106
+ Get-ChildItem
107
+ Get-CimAssociatedInstance
108
+ Get-CimClass
109
+ Get-CimInstance
110
+ Get-CimSession
111
+ Get-Clipboard
112
+ Get-CmsMessage
113
+ Get-Command
114
+ Get-ComputerInfo
115
+ Get-ComputerRestorePoint
116
+ Get-Content
117
+ Get-ControlPanelItem
118
+ Get-Counter
119
+ Get-Credential
120
+ Get-Culture
121
+ Get-Date
122
+ Get-Error
123
+ Get-Event
124
+ Get-EventLog
125
+ Get-EventSubscriber
126
+ Get-ExecutionPolicy
127
+ Get-ExperimentalFeature
128
+ Get-FileHash
129
+ Get-FormatData
130
+ Get-Help
131
+ Get-History
132
+ Get-Host
133
+ Get-HotFix
134
+ Get-InstalledModule
135
+ Get-InstalledScript
136
+ Get-IseSnippet
137
+ Get-Item
138
+ Get-ItemProperty
139
+ Get-ItemPropertyValue
140
+ Get-Job
141
+ Get-JobTrigger
142
+ Get-LocalGroup
143
+ Get-LocalGroupMember
144
+ Get-LocalUser
145
+ Get-Location
146
+ Get-LogProperties
147
+ Get-MarkdownOption
148
+ Get-Member
149
+ Get-Module
150
+ Get-OperationValidation
151
+ Get-PSBreakpoint
152
+ Get-PSCallStack
153
+ Get-PSDrive
154
+ Get-PSHostProcessInfo
155
+ Get-PSProvider
156
+ Get-PSReadLineKeyHandler
157
+ Get-PSReadLineOption
158
+ Get-PSRepository
159
+ Get-PSSession
160
+ Get-PSSessionCapability
161
+ Get-PSSessionConfiguration
162
+ Get-PSSnapin
163
+ Get-PSSubsystem
164
+ Get-Package
165
+ Get-PackageProvider
166
+ Get-PackageSource
167
+ Get-PfxCertificate
168
+ Get-Process
169
+ Get-Random
170
+ Get-Runspace
171
+ Get-RunspaceDebug
172
+ Get-ScheduledJob
173
+ Get-ScheduledJobOption
174
+ Get-Service
175
+ Get-TimeZone
176
+ Get-TraceSource
177
+ Get-Transaction
178
+ Get-TypeData
179
+ Get-UICulture
180
+ Get-Unique
181
+ Get-Uptime
182
+ Get-Variable
183
+ Get-Verb
184
+ Get-WSManCredSSP
185
+ Get-WSManInstance
186
+ Get-WinEvent
187
+ Get-WmiObject
188
+ Group-Object
189
+ Import-Alias
190
+ Import-BinaryMiLog
191
+ Import-Clixml
192
+ Import-Counter
193
+ Import-Csv
194
+ Import-IseSnippet
195
+ Import-LocalizedData
196
+ Import-Module
197
+ Import-PSSession
198
+ Import-PackageProvider
199
+ Import-PowerShellDataFile
200
+ Install-Module
201
+ Install-Package
202
+ Install-PackageProvider
203
+ Install-Script
204
+ Invoke-AsWorkflow
205
+ Invoke-CimMethod
206
+ Invoke-Command
207
+ Invoke-Expression
208
+ Invoke-History
209
+ Invoke-Item
210
+ Invoke-OperationValidation
211
+ Invoke-RestMethod
212
+ Invoke-WSManAction
213
+ Invoke-WebRequest
214
+ Invoke-WmiMethod
215
+ Join-Path
216
+ Join-String
217
+ Limit-EventLog
218
+ Measure-Command
219
+ Measure-Object
220
+ Move-Item
221
+ Move-ItemProperty
222
+ New-Alias
223
+ New-CimInstance
224
+ New-CimSession
225
+ New-CimSessionOption
226
+ New-Event
227
+ New-EventLog
228
+ New-FileCatalog
229
+ New-Guid
230
+ New-IseSnippet
231
+ New-Item
232
+ New-ItemProperty
233
+ New-JobTrigger
234
+ New-LocalGroup
235
+ New-LocalUser
236
+ New-Module
237
+ New-ModuleManifest
238
+ New-Object
239
+ New-PSDrive
240
+ New-PSRoleCapabilityFile
241
+ New-PSSession
242
+ New-PSSessionConfigurationFile
243
+ New-PSSessionOption
244
+ New-PSTransportOption
245
+ New-PSWorkflowExecutionOption
246
+ New-PSWorkflowSession
247
+ New-ScheduledJobOption
248
+ New-ScriptFileInfo
249
+ New-Service
250
+ New-TemporaryFile
251
+ New-TimeSpan
252
+ New-Variable
253
+ New-WSManInstance
254
+ New-WSManSessionOption
255
+ New-WebServiceProxy
256
+ New-WinEvent
257
+ Out-Default
258
+ Out-File
259
+ Out-GridView
260
+ Out-Host
261
+ Out-Null
262
+ Out-Printer
263
+ Out-String
264
+ Pop-Location
265
+ Protect-CmsMessage
266
+ Publish-Module
267
+ Publish-Script
268
+ Push-Location
269
+ Read-Host
270
+ Receive-Job
271
+ Receive-PSSession
272
+ Register-ArgumentCompleter
273
+ Register-CimIndicationEvent
274
+ Register-EngineEvent
275
+ Register-ObjectEvent
276
+ Register-PSRepository
277
+ Register-PSSessionConfiguration
278
+ Register-PackageSource
279
+ Register-ScheduledJob
280
+ Register-WmiEvent
281
+ Remove-Alias
282
+ Remove-CimInstance
283
+ Remove-CimSession
284
+ Remove-Computer
285
+ Remove-Event
286
+ Remove-EventLog
287
+ Remove-Item
288
+ Remove-ItemProperty
289
+ Remove-Job
290
+ Remove-JobTrigger
291
+ Remove-LocalGroup
292
+ Remove-LocalGroupMember
293
+ Remove-LocalUser
294
+ Remove-Module
295
+ Remove-PSBreakpoint
296
+ Remove-PSDrive
297
+ Remove-PSReadLineKeyHandler
298
+ Remove-PSSession
299
+ Remove-PSSnapin
300
+ Remove-Service
301
+ Remove-TypeData
302
+ Remove-Variable
303
+ Remove-WSManInstance
304
+ Remove-WmiObject
305
+ Rename-Computer
306
+ Rename-Item
307
+ Rename-ItemProperty
308
+ Rename-LocalGroup
309
+ Rename-LocalUser
310
+ Reset-ComputerMachinePassword
311
+ Resolve-Path
312
+ Restart-Computer
313
+ Restart-Service
314
+ Restore-Computer
315
+ Resume-Job
316
+ Resume-Service
317
+ Save-Help
318
+ Save-Module
319
+ Save-Package
320
+ Save-Script
321
+ Select-Object
322
+ Select-String
323
+ Select-Xml
324
+ Send-MailMessage
325
+ Set-Acl
326
+ Set-Alias
327
+ Set-AuthenticodeSignature
328
+ Set-CimInstance
329
+ Set-Clipboard
330
+ Set-Content
331
+ Set-Date
332
+ Set-ExecutionPolicy
333
+ Set-Item
334
+ Set-ItemProperty
335
+ Set-JobTrigger
336
+ Set-LocalGroup
337
+ Set-LocalUser
338
+ Set-Location
339
+ Set-LogProperties
340
+ Set-MarkdownOption
341
+ Set-PSBreakpoint
342
+ Set-PSDebug
343
+ Set-PSReadLineKeyHandler
344
+ Set-PSReadLineOption
345
+ Set-PSRepository
346
+ Set-PSSessionConfiguration
347
+ Set-PackageSource
348
+ Set-ScheduledJob
349
+ Set-ScheduledJobOption
350
+ Set-Service
351
+ Set-StrictMode
352
+ Set-TimeZone
353
+ Set-TraceSource
354
+ Set-Variable
355
+ Set-WSManInstance
356
+ Set-WSManQuickConfig
357
+ Set-WmiInstance
358
+ Show-Command
359
+ Show-ControlPanelItem
360
+ Show-EventLog
361
+ Show-Markdown
362
+ Sort-Object
363
+ Split-Path
364
+ Start-Job
365
+ Start-Process
366
+ Start-Service
367
+ Start-Sleep
368
+ Start-ThreadJob
369
+ Start-Trace
370
+ Start-Transaction
371
+ Start-Transcript
372
+ Stop-Computer
373
+ Stop-Job
374
+ Stop-Process
375
+ Stop-Service
376
+ Stop-Trace
377
+ Stop-Transcript
378
+ Suspend-Job
379
+ Suspend-Service
380
+ Switch-Process
381
+ Tee-Object
382
+ Test-ComputerSecureChannel
383
+ Test-Connection
384
+ Test-FileCatalog
385
+ Test-Json
386
+ Test-ModuleManifest
387
+ Test-PSSessionConfigurationFile
388
+ Test-Path
389
+ Test-ScriptFileInfo
390
+ Test-WSMan
391
+ Trace-Command
392
+ Unblock-File
393
+ Undo-Transaction
394
+ Uninstall-Module
395
+ Uninstall-Package
396
+ Uninstall-Script
397
+ Unprotect-CmsMessage
398
+ Unregister-Event
399
+ Unregister-PSRepository
400
+ Unregister-PSSessionConfiguration
401
+ Unregister-PackageSource
402
+ Unregister-ScheduledJob
403
+ Update-FormatData
404
+ Update-Help
405
+ Update-List
406
+ Update-Module
407
+ Update-ModuleManifest
408
+ Update-Script
409
+ Update-ScriptFileInfo
410
+ Update-TypeData
411
+ Use-Transaction
412
+ Wait-Debugger
413
+ Wait-Event
414
+ Wait-Job
415
+ Wait-Process
416
+ Where-Object
417
+ Write-Debug
418
+ Write-Error
419
+ Write-EventLog
420
+ Write-Host
421
+ Write-Information
422
+ Write-Output
423
+ Write-Progress
424
+ Write-Verbose
425
+ Write-Warning