diff options
author | Matt Graeber <PowerShellMafia@users.noreply.github.com> | 2015-11-05 13:26:05 -0500 |
---|---|---|
committer | Matt Graeber <PowerShellMafia@users.noreply.github.com> | 2015-11-05 13:26:05 -0500 |
commit | 18b7a10f89eb5f1038c443b5b39d3a8e327fb090 (patch) | |
tree | 1a1aa5b7aa31f3d5d0e7bee925549eb622cf9ff5 /README.md | |
parent | 641eff706e9f34914235441a70333b1daab73ae9 (diff) | |
download | PowerSploit-18b7a10f89eb5f1038c443b5b39d3a8e327fb090.tar.gz PowerSploit-18b7a10f89eb5f1038c443b5b39d3a8e327fb090.zip |
Removing Invoke-ShellcodeMSIL
This was only ever intended to be a PoC. I'll bring this back if
requested but it exhibits duplicate functionality.
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 4 |
1 files changed, 0 insertions, 4 deletions
@@ -18,10 +18,6 @@ Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or Injects shellcode into the process ID of your choosing or within PowerShell locally. -#### `Invoke-ShellcodeMSIL` - -Execute shellcode within the context of the running PowerShell process without making any Win32 function calls. - #### `Invoke-WmiCommand` Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel. |