aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2015-09-23 15:25:39 -0700
committerMatt Graeber <mattgraeber@gmail.com>2015-09-23 15:25:39 -0700
commit03ed2adb56a608a6e10cda8b924d76f5a3f0147f (patch)
tree8addf0e03953dc7b05a8997a87ae3c18f894c53f /README.md
parent5ce61e40f5eedb3f413e6278904b12bace0db2f5 (diff)
downloadPowerSploit-03ed2adb56a608a6e10cda8b924d76f5a3f0147f.tar.gz
PowerSploit-03ed2adb56a608a6e10cda8b924d76f5a3f0147f.zip
Adding Invoke-WmiCommand
Diffstat (limited to 'README.md')
-rw-r--r--README.md4
1 files changed, 4 insertions, 0 deletions
diff --git a/README.md b/README.md
index ed32e05..4761e00 100644
--- a/README.md
+++ b/README.md
@@ -22,6 +22,10 @@ Injects shellcode into the process ID of your choosing or within PowerShell loca
Execute shellcode within the context of the running PowerShell process without making any Win32 function calls.
+#### `Invoke-WmiCommand`
+
+Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel.
+
## ScriptModification
**Modify and/or prepare scripts for execution on a compromised machine.**