aboutsummaryrefslogtreecommitdiff
path: root/PETools/Get-PEHeader.ps1
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-01-21 08:33:51 -0500
committerbitform <matt@exploit-monday.com>2013-01-21 08:33:51 -0500
commit40eb187bca6a985ce7d24b19ac54c47ade285858 (patch)
tree1c3254a0eb82a9595690fed0900075044356252b /PETools/Get-PEHeader.ps1
parent46aead39c6f8d04b00b3c3f2aad10b7948aa003f (diff)
downloadPowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.tar.gz
PowerSploit-40eb187bca6a985ce7d24b19ac54c47ade285858.zip
Consistency improvements in comment-based help
Diffstat (limited to 'PETools/Get-PEHeader.ps1')
-rw-r--r--PETools/Get-PEHeader.ps17
1 files changed, 5 insertions, 2 deletions
diff --git a/PETools/Get-PEHeader.ps1 b/PETools/Get-PEHeader.ps1
index 49bfbd6..f32239c 100644
--- a/PETools/Get-PEHeader.ps1
+++ b/PETools/Get-PEHeader.ps1
@@ -1,8 +1,11 @@
-function Get-PEHeader {
+function Get-PEHeader
+{
<#
.SYNOPSIS
-PowerSploit Module - Get-PEHeader
+Parses and outputs the PE header of a process in memory or a PE file on disk.
+
+PowerSploit Function: Get-PEHeader
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
Required Dependencies: None