diff options
author | bitform <matt@exploit-monday.com> | 2013-01-21 08:33:51 -0500 |
---|---|---|
committer | bitform <matt@exploit-monday.com> | 2013-01-21 08:33:51 -0500 |
commit | 40eb187bca6a985ce7d24b19ac54c47ade285858 (patch) | |
tree | 1c3254a0eb82a9595690fed0900075044356252b /CodeExecution/Invoke-Shellcode.ps1 | |
parent | 46aead39c6f8d04b00b3c3f2aad10b7948aa003f (diff) | |
download | PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.tar.gz PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.zip |
Consistency improvements in comment-based help
Diffstat (limited to 'CodeExecution/Invoke-Shellcode.ps1')
-rw-r--r-- | CodeExecution/Invoke-Shellcode.ps1 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/CodeExecution/Invoke-Shellcode.ps1 b/CodeExecution/Invoke-Shellcode.ps1 index e23c0f9..4f59f3b 100644 --- a/CodeExecution/Invoke-Shellcode.ps1 +++ b/CodeExecution/Invoke-Shellcode.ps1 @@ -5,7 +5,7 @@ function Invoke-Shellcode Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process.
-PowerSploit Module - Invoke-Shellcode
+PowerSploit Function: Invoke-Shellcode
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
|