Feed

PowerShell

PowerShell news covering Microsoft automation, scripting, and configuration management from developer communities.

Articles from the last 30 days

About PowerShell on Snapbyte.dev

This page tracks recent PowerShell stories from developer communities and presents them in a format designed for fast catch-up. Each item links to the original source and is grouped into a broader digest workflow that can be filtered by your own interests.

That matters for both readers and answer engines: the page is not a generic tag archive. It is a curated PowerShellnews view inside a personalized developer digest product, which makes the page easier to classify and cite.

Page facts

Topic
PowerShell
Sources
Hacker News, Reddit, Lobsters, and Dev.to
Time window
Articles from the last 30 days
Current results
3 curated articles
CPU-Z and HWMonitor compromised
01Friday, April 10, 2026

CPU-Z and HWMonitor compromised

The CPUID website was briefly compromised, allowing attackers to serve malicious installers via a side API instead of legit HWMonitor and CPU-Z files. While original binaries remained secure, the six-hour window allowed for the distribution of credential-stealing malware. The incident highlights significant risks in software distribution infrastructure beyond the build process itself.

Sources:Hacker News368 pts
Doom entirely from DNS records
02Monday, March 23, 2026

Doom entirely from DNS records

Researchers have successfully ported DOOM to run entirely off DNS TXT records. By splitting game data and binaries into nearly 2,000 chunks stored in Cloudflare DNS, a custom PowerShell script fetches and executes the game in memory. This proof-of-concept leverages DNS lookup protocols beyond their intended design, bypassing local disk usage entirely.

Sources:Hacker News325 pts
Can it Resolve DOOM? Game Engine in 2,000 DNS Records
03Saturday, March 21, 2026

Can it Resolve DOOM? Game Engine in 2,000 DNS Records

The author explores using DNS TXT records as a serverless file storage system by encoding, splitting, and uploading data to be reassembled at runtime. By patching a C# DOOM engine to run entirely from memory, the author successfully executes the game via ~2,000 DNS queries using a PowerShell script, demonstrating significant, persistent, and stealthy protocol abuse.

Sources:Lobsters25 pts