diff options
author | mattifestation <mattgraeber@gmail.com> | 2013-11-07 07:28:53 -0500 |
---|---|---|
committer | mattifestation <mattgraeber@gmail.com> | 2013-11-07 07:28:53 -0500 |
commit | 5b4b9924d5a016af996ffac91a975b9822651451 (patch) | |
tree | 053750330c18ac6589937c71424cd714b34b5285 /ReverseEngineering/Get-ILDisassembly.format.ps1xml | |
parent | 20f0a5cd96b86b9441e9361df9b0c4d50293a3e2 (diff) | |
download | PowerSploit-5b4b9924d5a016af996ffac91a975b9822651451.tar.gz PowerSploit-5b4b9924d5a016af996ffac91a975b9822651451.zip |
Get-ILDisassembly now displays metadata tokens.
* Having metadata tokens displayed in output helps with reverse
engineering because you can pass metadata tokens to
System.Reflection.Module.ResolveMember and then easily interact with the
member in question.
* I also fixed a bug when displaying integer constants. I wasn't doing
an endian swap.
Diffstat (limited to 'ReverseEngineering/Get-ILDisassembly.format.ps1xml')
-rw-r--r-- | ReverseEngineering/Get-ILDisassembly.format.ps1xml | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/ReverseEngineering/Get-ILDisassembly.format.ps1xml b/ReverseEngineering/Get-ILDisassembly.format.ps1xml index f933e1e..3c610cc 100644 --- a/ReverseEngineering/Get-ILDisassembly.format.ps1xml +++ b/ReverseEngineering/Get-ILDisassembly.format.ps1xml @@ -18,6 +18,9 @@ <TableColumnHeader> <Label>Operand</Label> </TableColumnHeader> + <TableColumnHeader> + <Label>MetadataToken</Label> + </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> @@ -31,6 +34,9 @@ <TableColumnItem> <PropertyName>Operand</PropertyName> </TableColumnItem> + <TableColumnItem> + <ScriptBlock>if ($_.MetadataToken) {"0x$($_.MetadataToken.ToString('X8'))"}</ScriptBlock> + </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> |