diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2013-05-31 19:35:26 -0400 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2013-05-31 19:35:26 -0400 |
commit | dfec277813bfbc956dcac45345a9158093d68343 (patch) | |
tree | f205c4c4d6e81f33ace8086bbf63881ffc12dd51 /README.md | |
parent | 6e5338c8a34ade0ec0a4704031109fb5187620f8 (diff) | |
download | PowerSploit-dfec277813bfbc956dcac45345a9158093d68343.tar.gz PowerSploit-dfec277813bfbc956dcac45345a9158093d68343.zip |
Added Invoke-ReflectivePEInjection
Another awesome addition from Joe Bialek. Invoke-ReflectivePEInjection
is a vast improvement over Invoke-ReflectiveDllInjection. It adds the
following features:
* Now supports loading exe files in memory
* Supports reflective dll injection into a remote process
* Additional sample Visual Studio solutions
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -8,9 +8,9 @@ Injects a Dll into the process ID of your choosing. -#### `Invoke-ReflectiveDllInjection` +#### `Invoke-ReflectivePEInjection` -Reflectively loads a DLL in to memory of the Powershell process. +Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or reflectively injects a DLL in to a remote process. #### `Invoke-Shellcode` |