aboutsummaryrefslogtreecommitdiff
path: root/Exfiltration/Invoke-CredentialInjection.ps1
AgeCommit message (Collapse)AuthorFilesLines
2017-07-17+ PSv2 Compatibilityb33f1-1/+1
Fix for unable to index into object of type System.Diagnostic.Process on PSv2.
2017-07-17+ Invalid Cast Fixb33f1-2/+2
This is a fix for https://github.com/PowerShellMafia/PowerSploit/issues/151
2016-05-29Fixed FreeLibrary function signature #146Matt Graeber1-1/+1
The parameter type and return types were accidentally transposed. Thanks @rojaster for pointing this out.
2015-12-16Removed all version numbers from scriptsMatt Graeber1-1/+0
Scripts in a module should not be individually versioned. Only the module should be versioned.
2014-02-12Inject-LogonCredentials has been renamed to Invoke-CredentialInjection.clymb3r1-0/+3418
Added a check to ensure the script isn't being run from Session0 with the "NewWinLogon" flag. This flag does not work in Session0 because winlogon.exe tries to load stuff from user32.dll which requires a desktop is present. This is not possible in Session0 because there is no desktop/GUI, so it causes winlogon to load and then immediately close with error code c0000142 indicating a DLL failed to initialize. There is no way to fix this that I know of, if you need to run the script from Session0 use the "ExistingWinLogon" flag.