aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/Usage.md
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2015-12-16 14:31:03 -0800
committerMatt Graeber <mattgraeber@gmail.com>2015-12-16 14:31:03 -0800
commitf5d9b2527584912c87699f52fa639cf9d0fab42f (patch)
treec268910429459920e3d860b4ff7b5f7f2b01cf68 /CodeExecution/Usage.md
parentef37a138b8e0f76ff3ce1d6c2ccef65afae57d75 (diff)
downloadPowerSploit-f5d9b2527584912c87699f52fa639cf9d0fab42f.tar.gz
PowerSploit-f5d9b2527584912c87699f52fa639cf9d0fab42f.zip
Invoke-DllInjection detects OS arch on all OSes
This fix addresses issue #99. While I'm not the biggest fan of performing tests based on environment variables, I felt that making additional Win32 API calls would have been overkill.
Diffstat (limited to 'CodeExecution/Usage.md')
0 files changed, 0 insertions, 0 deletions