At the very end of the PowerUp.ps1 script i have appended the function call "Invoke-AllChecks". That way I can run all checks just by executing the script. In this video I used dot sourcing (. .\PowerUp.ps1) to do so
Some CTFs tend to be weird and unrealistic because they're like a puzzle that someone came up with for others to solve. There are many boxes in labs that rely on CVE-based vulnerabilities, misconfigurations and/or modern exploitation techniques that are 100% realistic and are commonly exploited in real-life penetration testings etc. But most importantly, there are realistic components in almost all CTFs.