aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/CodeExecution.psd1
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2013-04-06 07:04:16 -0400
committerMatt Graeber <mattgraeber@gmail.com>2013-04-06 07:04:16 -0400
commit2224f4dca9d856f37a02a9fe4c1941d27c4e564f (patch)
tree058c9943e5b8d277600b04095ffcb644d8cddf19 /CodeExecution/CodeExecution.psd1
parent014a7bb421477a18add25164d71e977574832c14 (diff)
downloadPowerSploit-2224f4dca9d856f37a02a9fe4c1941d27c4e564f.tar.gz
PowerSploit-2224f4dca9d856f37a02a9fe4c1941d27c4e564f.zip
Adding reflective DLL loading capability
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing this awesome code!
Diffstat (limited to 'CodeExecution/CodeExecution.psd1')
-rw-r--r--CodeExecution/CodeExecution.psd12
1 files changed, 1 insertions, 1 deletions
diff --git a/CodeExecution/CodeExecution.psd1 b/CodeExecution/CodeExecution.psd1
index 43360de..180c25e 100644
--- a/CodeExecution/CodeExecution.psd1
+++ b/CodeExecution/CodeExecution.psd1
@@ -74,7 +74,7 @@ ModuleList = @(@{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID =
# List of all files packaged with this module
FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', 'Invoke-DllInjection.ps1',
- 'Invoke-ShellcodeMSIL.ps1', 'Usage.md'
+ 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectiveDllInjection.ps1', 'Usage.md'
# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''