aboutsummaryrefslogtreecommitdiff
path: root/ReverseEngineering/ProcessModuleTrace.format.ps1xml
AgeCommit message (Collapse)AuthorFilesLines
2014-11-16Moving all RE functionality to PowerShellArsenalmattifestation1-36/+0
https://github.com/mattifestation/PowerShellArsenal PowerSploit will now stay true to its roots of being a purely offensive PowerShell module.
2013-11-13Normalized all scripts to ASCII encodingmattifestation1-2/+2
2013-08-29Added ProcessModuleTrace cmdletsmattifestation1-0/+36
Added *-ProcessModuleTrace cmdlets to trace details when modules are loaded into a process. These can be useful for malware analysis.