aboutsummaryrefslogtreecommitdiff
path: root/ReverseEngineering/Usage.txt
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-01-20 08:56:37 -0500
committerbitform <matt@exploit-monday.com>2013-01-20 08:56:37 -0500
commite9b22e9ae2391d1dc362501c282248945b3ca467 (patch)
treed59b12570e9142eddde74636288696ed5206d482 /ReverseEngineering/Usage.txt
parent59ff1a8b1eb3a8fba4dd9dee036a6c957f8f41ef (diff)
downloadPowerSploit-e9b22e9ae2391d1dc362501c282248945b3ca467.tar.gz
PowerSploit-e9b22e9ae2391d1dc362501c282248945b3ca467.zip
Removed logic in scripts to load ps1xml files
* Now that PETools and ReverseEngineering are both full-fledged modules with proper manifests, the manifests will take care of loading the appropriate ps1xml files. * Added Usage.txt to ReverseEngineering module.
Diffstat (limited to 'ReverseEngineering/Usage.txt')
-rw-r--r--ReverseEngineering/Usage.txt12
1 files changed, 12 insertions, 0 deletions
diff --git a/ReverseEngineering/Usage.txt b/ReverseEngineering/Usage.txt
new file mode 100644
index 0000000..dcfae6d
--- /dev/null
+++ b/ReverseEngineering/Usage.txt
@@ -0,0 +1,12 @@
+To install this module, drop the entire PETools folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable.
+
+The default per-user module path is: "$Env:HomeDrive$Env:HOMEPATH\Documents\WindowsPowerShell\Modules"
+The default computer-level module path is: "$Env:windir\System32\WindowsPowerShell\v1.0\Modules"
+
+To use the module, type `Import-Module ReverseEngineering`
+
+To see the commands imported, type `Get-Command -Module ReverseEngineering`
+
+For help on each individual command, Get-Help is your friend.
+
+Note: The tools contained within this module were all designed such that they can be run individually. Including them in a module simply lends itself to increased portability. \ No newline at end of file