This document summarizes a presentation on malicious payloads using PowerShell. It discusses how attackers often use PowerShell due to its native Windows capabilities and offensive tradecraft possibilities. The presentation provides examples of PowerShell usage in the wild, including downloading an executable and storing PowerShell in environment variables for persistence. Detection approaches are also examined, highlighting the importance of PowerShell logging.