aboutsummaryrefslogtreecommitdiff
path: root/README
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-01-19 18:59:40 -0500
committerbitform <matt@exploit-monday.com>2013-01-19 18:59:40 -0500
commit3c87916e19a942d3168cbe8cf37d0e380cdd865b (patch)
tree3e2d5d44dd2cedac7a1eded3bdde3ed618f53730 /README
parentfcb17a423678dbc5b6acf663df0ebe9d7cfbba17 (diff)
downloadPowerSploit-3c87916e19a942d3168cbe8cf37d0e380cdd865b.tar.gz
PowerSploit-3c87916e19a942d3168cbe8cf37d0e380cdd865b.zip
Renamed RE_Tools. Now ReverseEngineering module
* I renamed RE_Tools to ReverseEngineering and made it a module. * Slight consistency modifications were made to documentation. * This is one step in the process of modularizing all of PowerSploit.
Diffstat (limited to 'README')
-rw-r--r--README6
1 files changed, 3 insertions, 3 deletions
diff --git a/README b/README
index b62bef7..a07e868 100644
--- a/README
+++ b/README
@@ -54,9 +54,9 @@ Get-DllLoadPath:
Get-DllLoadPath returns the path from which Windows will load a Dll for the given executable.
-----------
-.\RE_Tools
-----------
+--------------------
+.\ReverseEngineering
+--------------------
Tools to aid in reverse engineering