aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/CodeExecution.psd1
diff options
context:
space:
mode:
authormattifestation <mattgraeber@gmail.com>2014-06-19 20:16:26 -0400
committermattifestation <mattgraeber@gmail.com>2014-06-19 20:16:26 -0400
commit80ffa19fa37399d857ecebea1fe821f3171b7967 (patch)
treeff6380fc6d00c4d42b940f4545a4afc814f4c868 /CodeExecution/CodeExecution.psd1
parent3444a0700e07e2471e894ce50af69552665e3fbe (diff)
downloadPowerSploit-80ffa19fa37399d857ecebea1fe821f3171b7967.tar.gz
PowerSploit-80ffa19fa37399d857ecebea1fe821f3171b7967.zip
Removing Watch-BlueScreen
This vulnerability was patched a while ago making this function largely irrelevant.
Diffstat (limited to 'CodeExecution/CodeExecution.psd1')
-rw-r--r--CodeExecution/CodeExecution.psd12
1 files changed, 1 insertions, 1 deletions
diff --git a/CodeExecution/CodeExecution.psd1 b/CodeExecution/CodeExecution.psd1
index 07963fc..85258a5 100644
--- a/CodeExecution/CodeExecution.psd1
+++ b/CodeExecution/CodeExecution.psd1
@@ -74,7 +74,7 @@ ModuleList = @(@{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID =
# List of all files packaged with this module
FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', 'Invoke-DllInjection.ps1',
- 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Watch-BlueScreen.ps1', 'Usage.md'
+ 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Usage.md'
# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''