aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2013-04-06 07:04:16 -0400
committerMatt Graeber <mattgraeber@gmail.com>2013-04-06 07:04:16 -0400
commit2224f4dca9d856f37a02a9fe4c1941d27c4e564f (patch)
tree058c9943e5b8d277600b04095ffcb644d8cddf19 /README.md
parent014a7bb421477a18add25164d71e977574832c14 (diff)
downloadPowerSploit-2224f4dca9d856f37a02a9fe4c1941d27c4e564f.tar.gz
PowerSploit-2224f4dca9d856f37a02a9fe4c1941d27c4e564f.zip
Adding reflective DLL loading capability
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing this awesome code!
Diffstat (limited to 'README.md')
-rw-r--r--README.md4
1 files changed, 4 insertions, 0 deletions
diff --git a/README.md b/README.md
index 372f09a..3ee10be 100644
--- a/README.md
+++ b/README.md
@@ -8,6 +8,10 @@
Injects a Dll into the process ID of your choosing.
+#### `Invoke-ReflectiveDllInjection`
+
+Reflectively loads a DLL in to memory of the Powershell process.
+
#### `Invoke-Shellcode`
Injects shellcode into the process ID of your choosing or within PowerShell locally.