diff options
author | mattifestation <mattgraeber@gmail.com> | 2014-06-19 20:16:26 -0400 |
---|---|---|
committer | mattifestation <mattgraeber@gmail.com> | 2014-06-19 20:16:26 -0400 |
commit | 80ffa19fa37399d857ecebea1fe821f3171b7967 (patch) | |
tree | ff6380fc6d00c4d42b940f4545a4afc814f4c868 /CodeExecution/CodeExecution.psd1 | |
parent | 3444a0700e07e2471e894ce50af69552665e3fbe (diff) | |
download | PowerSploit-80ffa19fa37399d857ecebea1fe821f3171b7967.tar.gz PowerSploit-80ffa19fa37399d857ecebea1fe821f3171b7967.zip |
Removing Watch-BlueScreen
This vulnerability was patched a while ago making this function largely
irrelevant.
Diffstat (limited to 'CodeExecution/CodeExecution.psd1')
-rw-r--r-- | CodeExecution/CodeExecution.psd1 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/CodeExecution/CodeExecution.psd1 b/CodeExecution/CodeExecution.psd1 index 07963fc..85258a5 100644 --- a/CodeExecution/CodeExecution.psd1 +++ b/CodeExecution/CodeExecution.psd1 @@ -74,7 +74,7 @@ ModuleList = @(@{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID = # List of all files packaged with this module FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', 'Invoke-DllInjection.ps1', - 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Watch-BlueScreen.ps1', 'Usage.md' + 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Usage.md' # Private data to pass to the module specified in RootModule/ModuleToProcess # PrivateData = '' |