aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2013-04-05 14:06:58 -0400
committerMatt Graeber <mattgraeber@gmail.com>2013-04-05 14:06:58 -0400
commit014a7bb421477a18add25164d71e977574832c14 (patch)
tree30f40fa625a3824fa4ef4cebf412e0033dabf8de /README.md
parent1e79c0f7938159e428e073eddb5e0a7a38701580 (diff)
downloadPowerSploit-014a7bb421477a18add25164d71e977574832c14.tar.gz
PowerSploit-014a7bb421477a18add25164d71e977574832c14.zip
Adding Invoke-ShellcodeMSIL
Invoke-ShellcodeMSIL executes shellcode without making any Win32 function calls.
Diffstat (limited to 'README.md')
-rw-r--r--README.md4
1 files changed, 4 insertions, 0 deletions
diff --git a/README.md b/README.md
index 1539525..372f09a 100644
--- a/README.md
+++ b/README.md
@@ -12,6 +12,10 @@ Injects a Dll into the process ID of your choosing.
Injects shellcode into the process ID of your choosing or within PowerShell locally.
+#### `Invoke-ShellcodeMSIL`
+
+Execute shellcode within the context of the running PowerShell process without making any Win32 function calls.
+
## ScriptModification
**Modify and/or prepare scripts for execution on a compromised machine.**