diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2013-04-05 14:06:58 -0400 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2013-04-05 14:06:58 -0400 |
commit | 014a7bb421477a18add25164d71e977574832c14 (patch) | |
tree | 30f40fa625a3824fa4ef4cebf412e0033dabf8de /README.md | |
parent | 1e79c0f7938159e428e073eddb5e0a7a38701580 (diff) | |
download | PowerSploit-014a7bb421477a18add25164d71e977574832c14.tar.gz PowerSploit-014a7bb421477a18add25164d71e977574832c14.zip |
Adding Invoke-ShellcodeMSIL
Invoke-ShellcodeMSIL executes shellcode without making any Win32
function calls.
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 4 |
1 files changed, 4 insertions, 0 deletions
@@ -12,6 +12,10 @@ Injects a Dll into the process ID of your choosing. Injects shellcode into the process ID of your choosing or within PowerShell locally. +#### `Invoke-ShellcodeMSIL` + +Execute shellcode within the context of the running PowerShell process without making any Win32 function calls. + ## ScriptModification **Modify and/or prepare scripts for execution on a compromised machine.** |