diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2015-09-23 15:25:39 -0700 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2015-09-23 15:25:39 -0700 |
commit | 03ed2adb56a608a6e10cda8b924d76f5a3f0147f (patch) | |
tree | 8addf0e03953dc7b05a8997a87ae3c18f894c53f /README.md | |
parent | 5ce61e40f5eedb3f413e6278904b12bace0db2f5 (diff) | |
download | PowerSploit-03ed2adb56a608a6e10cda8b924d76f5a3f0147f.tar.gz PowerSploit-03ed2adb56a608a6e10cda8b924d76f5a3f0147f.zip |
Adding Invoke-WmiCommand
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 4 |
1 files changed, 4 insertions, 0 deletions
@@ -22,6 +22,10 @@ Injects shellcode into the process ID of your choosing or within PowerShell loca Execute shellcode within the context of the running PowerShell process without making any Win32 function calls. +#### `Invoke-WmiCommand` + +Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel. + ## ScriptModification **Modify and/or prepare scripts for execution on a compromised machine.** |