aboutsummaryrefslogtreecommitdiff
path: root/Exfiltration/Invoke-TokenManipulation.ps1
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2015-12-16 17:07:39 -0800
committerMatt Graeber <mattgraeber@gmail.com>2015-12-16 17:08:57 -0800
commitc2a70924e16cd80a1c07d9de82db893b32a4aba9 (patch)
tree466de8532814bbc700624138aaac5c8b081a19c5 /Exfiltration/Invoke-TokenManipulation.ps1
parentb01a8127bc71f5454762510ed09c69411dd3a403 (diff)
downloadPowerSploit-c2a70924e16cd80a1c07d9de82db893b32a4aba9.tar.gz
PowerSploit-c2a70924e16cd80a1c07d9de82db893b32a4aba9.zip
Removed all version numbers from scripts
Scripts in a module should not be individually versioned. Only the module should be versioned.
Diffstat (limited to 'Exfiltration/Invoke-TokenManipulation.ps1')
-rw-r--r--Exfiltration/Invoke-TokenManipulation.ps12
1 files changed, 0 insertions, 2 deletions
diff --git a/Exfiltration/Invoke-TokenManipulation.ps1 b/Exfiltration/Invoke-TokenManipulation.ps1
index 90f9d47..3a61da8 100644
--- a/Exfiltration/Invoke-TokenManipulation.ps1
+++ b/Exfiltration/Invoke-TokenManipulation.ps1
@@ -49,8 +49,6 @@ Author: Joe Bialek, Twitter: @JosephBialek
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
-Version: 1.12
-(1.11 -> 1.12: Simple logic added by Josh M. Bryant to find an unprotected process to grab a SYSTEM token from, rather than hardcoding to wininit, https://www.fixtheexchange.com/)
.DESCRIPTION