aboutsummaryrefslogtreecommitdiff
path: root/PETools/Get-PEHeader.ps1
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-01-20 08:56:37 -0500
committerbitform <matt@exploit-monday.com>2013-01-20 08:56:37 -0500
commite9b22e9ae2391d1dc362501c282248945b3ca467 (patch)
treed59b12570e9142eddde74636288696ed5206d482 /PETools/Get-PEHeader.ps1
parent59ff1a8b1eb3a8fba4dd9dee036a6c957f8f41ef (diff)
downloadPowerSploit-e9b22e9ae2391d1dc362501c282248945b3ca467.tar.gz
PowerSploit-e9b22e9ae2391d1dc362501c282248945b3ca467.zip
Removed logic in scripts to load ps1xml files
* Now that PETools and ReverseEngineering are both full-fledged modules with proper manifests, the manifests will take care of loading the appropriate ps1xml files. * Added Usage.txt to ReverseEngineering module.
Diffstat (limited to 'PETools/Get-PEHeader.ps1')
-rw-r--r--PETools/Get-PEHeader.ps17
1 files changed, 0 insertions, 7 deletions
diff --git a/PETools/Get-PEHeader.ps1 b/PETools/Get-PEHeader.ps1
index 354b675..49bfbd6 100644
--- a/PETools/Get-PEHeader.ps1
+++ b/PETools/Get-PEHeader.ps1
@@ -99,13 +99,6 @@ http://www.exploit-monday.com/2012/07/get-peheader.html
)
PROCESS {
-
- # Apply custom view to the PE header format only if file exists and has not yet been applied
- $FormatFilePath = Join-Path $PsScriptRoot 'PETools.Format.ps1xml'
-
- if ((Test-Path $FormatFilePath) -and !(Get-FormatData PEHeader)) {
- Update-FormatData -PrependPath $FormatFilePath
- }
switch ($PsCmdlet.ParameterSetName) {
'OnDisk' {