aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/Invoke-ShellcodeMSIL.ps1
diff options
context:
space:
mode:
authormattifestation <mattgraeber@gmail.com>2013-11-07 07:28:53 -0500
committermattifestation <mattgraeber@gmail.com>2013-11-07 07:28:53 -0500
commit5b4b9924d5a016af996ffac91a975b9822651451 (patch)
tree053750330c18ac6589937c71424cd714b34b5285 /CodeExecution/Invoke-ShellcodeMSIL.ps1
parent20f0a5cd96b86b9441e9361df9b0c4d50293a3e2 (diff)
downloadPowerSploit-5b4b9924d5a016af996ffac91a975b9822651451.tar.gz
PowerSploit-5b4b9924d5a016af996ffac91a975b9822651451.zip
Get-ILDisassembly now displays metadata tokens.
* Having metadata tokens displayed in output helps with reverse engineering because you can pass metadata tokens to System.Reflection.Module.ResolveMember and then easily interact with the member in question. * I also fixed a bug when displaying integer constants. I wasn't doing an endian swap.
Diffstat (limited to 'CodeExecution/Invoke-ShellcodeMSIL.ps1')
0 files changed, 0 insertions, 0 deletions