aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-01-21 08:33:51 -0500
committerbitform <matt@exploit-monday.com>2013-01-21 08:33:51 -0500
commit40eb187bca6a985ce7d24b19ac54c47ade285858 (patch)
tree1c3254a0eb82a9595690fed0900075044356252b /CodeExecution
parent46aead39c6f8d04b00b3c3f2aad10b7948aa003f (diff)
downloadPowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.tar.gz
PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.zip
Consistency improvements in comment-based help
Diffstat (limited to 'CodeExecution')
-rw-r--r--CodeExecution/Invoke-DllInjection.ps12
-rw-r--r--CodeExecution/Invoke-Shellcode.ps12
2 files changed, 2 insertions, 2 deletions
diff --git a/CodeExecution/Invoke-DllInjection.ps1 b/CodeExecution/Invoke-DllInjection.ps1
index b62e7a1..572a911 100644
--- a/CodeExecution/Invoke-DllInjection.ps1
+++ b/CodeExecution/Invoke-DllInjection.ps1
@@ -5,7 +5,7 @@ function Invoke-DllInjection
Injects a Dll into the process ID of your choosing.
-PowerSploit Module - Invoke-DllInjection
+PowerSploit Function: Invoke-DllInjection
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None
diff --git a/CodeExecution/Invoke-Shellcode.ps1 b/CodeExecution/Invoke-Shellcode.ps1
index e23c0f9..4f59f3b 100644
--- a/CodeExecution/Invoke-Shellcode.ps1
+++ b/CodeExecution/Invoke-Shellcode.ps1
@@ -5,7 +5,7 @@ function Invoke-Shellcode
Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process.
-PowerSploit Module - Invoke-Shellcode
+PowerSploit Function: Invoke-Shellcode
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None