aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/Invoke-Shellcode.ps1
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-01-21 08:33:51 -0500
committerbitform <matt@exploit-monday.com>2013-01-21 08:33:51 -0500
commit40eb187bca6a985ce7d24b19ac54c47ade285858 (patch)
tree1c3254a0eb82a9595690fed0900075044356252b /CodeExecution/Invoke-Shellcode.ps1
parent46aead39c6f8d04b00b3c3f2aad10b7948aa003f (diff)
downloadPowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.tar.gz
PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.zip
Consistency improvements in comment-based help
Diffstat (limited to 'CodeExecution/Invoke-Shellcode.ps1')
-rw-r--r--CodeExecution/Invoke-Shellcode.ps12
1 files changed, 1 insertions, 1 deletions
diff --git a/CodeExecution/Invoke-Shellcode.ps1 b/CodeExecution/Invoke-Shellcode.ps1
index e23c0f9..4f59f3b 100644
--- a/CodeExecution/Invoke-Shellcode.ps1
+++ b/CodeExecution/Invoke-Shellcode.ps1
@@ -5,7 +5,7 @@ function Invoke-Shellcode
Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process.
-PowerSploit Module - Invoke-Shellcode
+PowerSploit Function: Invoke-Shellcode
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None