aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorMatt Graeber <mattgraeber@gmail.com>2013-05-31 19:35:26 -0400
committerMatt Graeber <mattgraeber@gmail.com>2013-05-31 19:35:26 -0400
commitdfec277813bfbc956dcac45345a9158093d68343 (patch)
treef205c4c4d6e81f33ace8086bbf63881ffc12dd51 /README.md
parent6e5338c8a34ade0ec0a4704031109fb5187620f8 (diff)
downloadPowerSploit-dfec277813bfbc956dcac45345a9158093d68343.tar.gz
PowerSploit-dfec277813bfbc956dcac45345a9158093d68343.zip
Added Invoke-ReflectivePEInjection
Another awesome addition from Joe Bialek. Invoke-ReflectivePEInjection is a vast improvement over Invoke-ReflectiveDllInjection. It adds the following features: * Now supports loading exe files in memory * Supports reflective dll injection into a remote process * Additional sample Visual Studio solutions
Diffstat (limited to 'README.md')
-rw-r--r--README.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/README.md b/README.md
index 54f7997..7006f89 100644
--- a/README.md
+++ b/README.md
@@ -8,9 +8,9 @@
Injects a Dll into the process ID of your choosing.
-#### `Invoke-ReflectiveDllInjection`
+#### `Invoke-ReflectivePEInjection`
-Reflectively loads a DLL in to memory of the Powershell process.
+Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or reflectively injects a DLL in to a remote process.
#### `Invoke-Shellcode`