TroubleChute Logo
< Go Back

TroubleChute Script Hub

Currently viewing: PowerShell/Modules/Invoke-Elevated.psm1

NOTE: The following code may be out-of-date compared to GitHub, but is all pulled from GitHub every hour or so.

When shortlinks are used (filename as subdomain), code used by PowerShell and other interactions with this site is served from GitHub.

(Right-click -> Download the button below to save the file)

Last modified: 2023-04-12T20:59:52.000+02:00

# Copyright (C) 2023 TroubleChute (Wesley Pyburn)
# Licensed under the GNU General Public License v3.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#    This program is free software: you can redistribute it and/or modify
#    it under the terms of the GNU General Public License as published by
#    the Free Software Foundation, either version 3 of the License, or
#    (at your option) any later version.
#    This program is distributed in the hope that it will be useful,
#    but WITHOUT ANY WARRANTY; without even the implied warranty of
#    GNU General Public License for more details.
#    You should have received a copy of the GNU General Public License
#    along with this program.  If not, see .
# ----------------------------------------
# Use this function to open an elevated Powershell window (if not already elevated) and run a script.
# Call as `Invoke-Elevated {echo "test"}`, for example.
# ----------------------------------------

   Executes a script block with elevated privileges.

   The Invoke-Elevated function runs the provided script block with administrative privileges. If the current session does not have administrative privileges, it starts a new elevated PowerShell session, executes the script block, and waits for the elevated session to close before continuing with the original script.

.Parameter Script
   The script block to be executed with elevated privileges.

.Parameter Arguments
   An optional array of arguments to pass to the script block.

   Invoke-Elevated { param($dir) Remove-Item -Path $dir -Recurse -Force } -Arguments "C:\ProtectedFolder"

   This example removes a protected folder by invoking the Remove-Item cmdlet with elevated privileges.
function Invoke-Elevated([ScriptBlock]$Script, $Arguments) {
    if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
        $tempFile = [System.IO.Path]::GetTempFileName()
        $encodedScript = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($Script.ToString()))
        $psPath = (Get-Command powershell.exe).Source
        $argumentsList = @("-NoExit", "-Command &{cd '$(Get-Location)'; [ScriptBlock]::Create([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('$encodedScript'))).Invoke($Arguments); Remove-Item -Path '$tempFile'; Exit}")
        Start-Process -FilePath $psPath -Verb RunAs -ArgumentList $argumentsList

        Write-Host "New PowerShell window opened with Admin privileges. After completing tasks in the Admin window, close it to continue with the original script." -ForegroundColor Yellow
        Write-Host "Waiting for elevated session to close..." -ForegroundColor Yellow

        while (Test-Path -Path $tempFile) {
            Start-Sleep -Seconds 1

        Write-Host "Elevated session closed. Continuing script execution..." -ForegroundColor Yellow
    } else {

TCNO TechNobo / TroubleChute © Wesley Pyburn (TroubleChute)
Support Me Privacy Policy Cookies Policy Terms of Service Contact