aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/CodeExecution.psd1
AgeCommit message (Collapse)AuthorFilesLines
2015-12-18Set all module versions to 3.0Matt Graeber1-56/+1
Also cleaned up some module manifest cruft.
2015-11-05Removing Invoke-ShellcodeMSILMatt Graeber1-1/+1
This was only ever intended to be a PoC. I'll bring this back if requested but it exhibits duplicate functionality.
2015-11-04Migrating everything back to Invoke-Shellcode.ps1. I'm done making my point ↵Matt Graeber1-1/+1
now. :P
2015-09-23Adding Invoke-WmiCommandMatt Graeber1-1/+1
2015-02-03Moved Invoke-Shellcodemattifestation1-1/+1
These things happen
2014-06-19Removing Watch-BlueScreenmattifestation1-1/+1
This vulnerability was patched a while ago making this function largely irrelevant.
2013-11-13Normalized all scripts to ASCII encodingmattifestation1-2/+2
2013-05-31Added Invoke-ReflectivePEInjectionMatt Graeber1-1/+1
Another awesome addition from Joe Bialek. Invoke-ReflectivePEInjection is a vast improvement over Invoke-ReflectiveDllInjection. It adds the following features: * Now supports loading exe files in memory * Supports reflective dll injection into a remote process * Additional sample Visual Studio solutions
2013-05-13Added Watch-BlueScreenMatt Graeber1-1/+1
Causes a blue-screen (bugcheck) to occur.
2013-04-06Adding reflective DLL loading capabilityMatt Graeber1-1/+1
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing this awesome code!
2013-04-05Adding Invoke-ShellcodeMSILMatt Graeber1-87/+87
Invoke-ShellcodeMSIL executes shellcode without making any Win32 function calls.
2013-01-20Added 'CodeExecution' Modulebitform1-0/+88
* I unfortunately needed to change the names of Inject-Shellcode and Inject-Dll to Invoke-Shellcode and Invoke-DllInjection in order to confirm to proper verb naming.