aboutsummaryrefslogtreecommitdiff
path: root/Exfiltration/mimikatz-1.0/tools
diff options
context:
space:
mode:
authormattifestation <mattgraeber@gmail.com>2014-02-03 17:13:35 -0500
committermattifestation <mattgraeber@gmail.com>2014-02-03 17:13:41 -0500
commitc5168cdba6a3b2d7dd8d79c8ac9583d3ace6a504 (patch)
tree31e4238db4984481442faa780e8921782c5de848 /Exfiltration/mimikatz-1.0/tools
parentd9ca5357e4603222268b1c619da10cc7858153d4 (diff)
downloadPowerSploit-c5168cdba6a3b2d7dd8d79c8ac9583d3ace6a504.tar.gz
PowerSploit-c5168cdba6a3b2d7dd8d79c8ac9583d3ace6a504.zip
Removed mimikatz.
This doesn't need to reside in PowerSploit. Those that are truly paranoid should validate that the embedded executable in Invoke-Mimikatz.ps1 is indeed mimikatz. This was causing AV to flag upon downloading PowerSploit.
Diffstat (limited to 'Exfiltration/mimikatz-1.0/tools')
-rw-r--r--Exfiltration/mimikatz-1.0/tools/PsExec.exebin381816 -> 0 bytes
-rw-r--r--Exfiltration/mimikatz-1.0/tools/tee.exebin16896 -> 0 bytes
-rw-r--r--Exfiltration/mimikatz-1.0/tools/winmine.exebin119808 -> 0 bytes
3 files changed, 0 insertions, 0 deletions
diff --git a/Exfiltration/mimikatz-1.0/tools/PsExec.exe b/Exfiltration/mimikatz-1.0/tools/PsExec.exe
deleted file mode 100644
index ed67480..0000000
--- a/Exfiltration/mimikatz-1.0/tools/PsExec.exe
+++ /dev/null
Binary files differ
diff --git a/Exfiltration/mimikatz-1.0/tools/tee.exe b/Exfiltration/mimikatz-1.0/tools/tee.exe
deleted file mode 100644
index 7b32b2a..0000000
--- a/Exfiltration/mimikatz-1.0/tools/tee.exe
+++ /dev/null
Binary files differ
diff --git a/Exfiltration/mimikatz-1.0/tools/winmine.exe b/Exfiltration/mimikatz-1.0/tools/winmine.exe
deleted file mode 100644
index 3833d6c..0000000
--- a/Exfiltration/mimikatz-1.0/tools/winmine.exe
+++ /dev/null
Binary files differ