aboutsummaryrefslogtreecommitdiff
path: root/ReverseEngineering/Get-NtSystemInformation.format.ps1xml
AgeCommit message (Collapse)AuthorFilesLines
2014-11-16Moving all RE functionality to PowerShellArsenalmattifestation1-440/+0
https://github.com/mattifestation/PowerShellArsenal PowerSploit will now stay true to its roots of being a purely offensive PowerShell module.
2013-11-13Normalized all scripts to ASCII encodingmattifestation1-1/+1
2013-07-04Get-NtSystemInformation can now query UMCI infoMatt Graeber1-0/+21
Get-NtSystemInformation now returns SystemCodeIntegrityInformation - i.e. user-mode code integrity settings. This required reverse engineering a dll that is only present on Windows 8 ARM devices.
2013-06-01Type names added to Get-NtSystemInformationMatt Graeber1-3/+2
When displaying handle information, you can now filter by and display object type names: Get-NtSystemInformation
2013-05-16_SYSTEM_HANDLE_INFORMATION prints as a table nowMatt Graeber1-34/+56
2013-05-16Added _SYSTEM_LOCK_INFORMATION structMatt Graeber1-0/+64
Yet another method of leaking kernel pointers.
2013-05-12Added Get-NtSystemInformationMatt Graeber1-0/+334
Get-NtSystemInformation is a wrapper function for NtQuerySystemInformation. It is a swiss-army knife tool for obtaining internal OS information. It can currently be used to query the following: global flags, handles, objects, kernel pool allocations, and loaded kernel modules