aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/CodeExecution.psd1
AgeCommit message (Collapse)AuthorFilesLines
2014-06-19Removing Watch-BlueScreenmattifestation1-1/+1
This vulnerability was patched a while ago making this function largely irrelevant.
2013-11-13Normalized all scripts to ASCII encodingmattifestation1-2/+2
2013-05-31Added Invoke-ReflectivePEInjectionMatt Graeber1-1/+1
Another awesome addition from Joe Bialek. Invoke-ReflectivePEInjection is a vast improvement over Invoke-ReflectiveDllInjection. It adds the following features: * Now supports loading exe files in memory * Supports reflective dll injection into a remote process * Additional sample Visual Studio solutions
2013-05-13Added Watch-BlueScreenMatt Graeber1-1/+1
Causes a blue-screen (bugcheck) to occur.
2013-04-06Adding reflective DLL loading capabilityMatt Graeber1-1/+1
Adding Invoke-ReflectiveDllInjection. PowerSploit now has reflective DLL loading capabilities!!! Thanks to Joe Bialek @JosephBialek for writing this awesome code!
2013-04-05Adding Invoke-ShellcodeMSILMatt Graeber1-87/+87
Invoke-ShellcodeMSIL executes shellcode without making any Win32 function calls.
2013-01-20Added 'CodeExecution' Modulebitform1-0/+88
* I unfortunately needed to change the names of Inject-Shellcode and Inject-Dll to Invoke-Shellcode and Invoke-DllInjection in order to confirm to proper verb naming.