aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/Invoke-WmiCommand.ps1
diff options
context:
space:
mode:
authorMatt Graeber <PowerShellMafia@users.noreply.github.com>2015-11-05 10:31:40 -0500
committerMatt Graeber <PowerShellMafia@users.noreply.github.com>2015-11-05 10:31:40 -0500
commit5065810c071a7cdbe5bd28384d35f0b8a90cabeb (patch)
tree59ec182ba480d6db6ced1712345d2cadbfc03903 /CodeExecution/Invoke-WmiCommand.ps1
parentd0fff7b6371ccb52952268f47ae68e85c3aeeb91 (diff)
downloadPowerSploit-5065810c071a7cdbe5bd28384d35f0b8a90cabeb.tar.gz
PowerSploit-5065810c071a7cdbe5bd28384d35f0b8a90cabeb.zip
Removing Metasploit integration from Invoke-Shellcode
This should have only ever been a shellcode runner. Those wishing to integrate this with Metasploit should generate a shellcode payload with msfvenom.
Diffstat (limited to 'CodeExecution/Invoke-WmiCommand.ps1')
0 files changed, 0 insertions, 0 deletions