aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/CodeExecution.psm1
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2013-07-04 13:01:47 -0400
committerMatt Graeber <mattgraeber@gmail.com>2013-07-04 13:01:47 -0400
commit2a45cfbd1e0b4d300f69a2a571882c39740b76e3 (patch)
treedabd6d3ff7ed38895e05ae63327ef907c6e8dac6 /CodeExecution/CodeExecution.psm1
parent9de59e9e3f3c3721f7c93e58b60ea2738590fa8e (diff)
downloadPowerSploit-2a45cfbd1e0b4d300f69a2a571882c39740b76e3.tar.gz
PowerSploit-2a45cfbd1e0b4d300f69a2a571882c39740b76e3.zip
Get-NtSystemInformation can now query UMCI info
Get-NtSystemInformation now returns SystemCodeIntegrityInformation - i.e. user-mode code integrity settings. This required reverse engineering a dll that is only present on Windows 8 ARM devices.
Diffstat (limited to 'CodeExecution/CodeExecution.psm1')
0 files changed, 0 insertions, 0 deletions