diff options
author | bitform <matt@exploit-monday.com> | 2013-01-20 08:56:37 -0500 |
---|---|---|
committer | bitform <matt@exploit-monday.com> | 2013-01-20 08:56:37 -0500 |
commit | e9b22e9ae2391d1dc362501c282248945b3ca467 (patch) | |
tree | d59b12570e9142eddde74636288696ed5206d482 /PETools | |
parent | 59ff1a8b1eb3a8fba4dd9dee036a6c957f8f41ef (diff) | |
download | PowerSploit-e9b22e9ae2391d1dc362501c282248945b3ca467.tar.gz PowerSploit-e9b22e9ae2391d1dc362501c282248945b3ca467.zip |
Removed logic in scripts to load ps1xml files
* Now that PETools and ReverseEngineering are both full-fledged modules
with proper manifests, the manifests will take care of loading the
appropriate ps1xml files.
* Added Usage.txt to ReverseEngineering module.
Diffstat (limited to 'PETools')
-rw-r--r-- | PETools/Get-PEHeader.ps1 | 7 |
1 files changed, 0 insertions, 7 deletions
diff --git a/PETools/Get-PEHeader.ps1 b/PETools/Get-PEHeader.ps1 index 354b675..49bfbd6 100644 --- a/PETools/Get-PEHeader.ps1 +++ b/PETools/Get-PEHeader.ps1 @@ -99,13 +99,6 @@ http://www.exploit-monday.com/2012/07/get-peheader.html )
PROCESS {
-
- # Apply custom view to the PE header format only if file exists and has not yet been applied
- $FormatFilePath = Join-Path $PsScriptRoot 'PETools.Format.ps1xml'
-
- if ((Test-Path $FormatFilePath) -and !(Get-FormatData PEHeader)) {
- Update-FormatData -PrependPath $FormatFilePath
- }
switch ($PsCmdlet.ParameterSetName) {
'OnDisk' {
|