This document introduces a PowerShell weaponization tool called Harness that allows attackers to run PowerShell scripts remotely on target machines in an interactive manner. It addresses common challenges like seamlessly importing modules across the network. The tool was developed by Rich Kelley, a computer scientist and penetration tester, to be fully interactive like native PowerShell while only requiring .NET 4.0+. It is demonstrated running on various Windows versions communicating over Python/asyncio on Linux. Defense recommendations include restricting access to PowerShell and enabling monitoring.