diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2013-04-06 07:04:16 -0400 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2013-04-06 07:04:16 -0400 |
commit | 2224f4dca9d856f37a02a9fe4c1941d27c4e564f (patch) | |
tree | 058c9943e5b8d277600b04095ffcb644d8cddf19 /README.md | |
parent | 014a7bb421477a18add25164d71e977574832c14 (diff) | |
download | PowerSploit-2224f4dca9d856f37a02a9fe4c1941d27c4e564f.tar.gz PowerSploit-2224f4dca9d856f37a02a9fe4c1941d27c4e564f.zip |
Adding reflective DLL loading capability
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL
loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing
this awesome code!
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 4 |
1 files changed, 4 insertions, 0 deletions
@@ -8,6 +8,10 @@ Injects a Dll into the process ID of your choosing. +#### `Invoke-ReflectiveDllInjection` + +Reflectively loads a DLL in to memory of the Powershell process. + #### `Invoke-Shellcode` Injects shellcode into the process ID of your choosing or within PowerShell locally. |