This script is adapted to perform a privilege escalation and a custom edition of the local DNS hosts file on Windows machines, located in the C:\Windows\system32\drivers\etc\ directory.
- Changing the default's
RestrictedExecutionPolicy toBypassfor theCurrentUserScope.