aboutsummaryrefslogtreecommitdiff
path: root/ReverseEngineering/ProcessModuleTrace.ps1
AgeCommit message (Collapse)AuthorFilesLines
2014-11-16Moving all RE functionality to PowerShellArsenalmattifestation1-103/+0
https://github.com/mattifestation/PowerShellArsenal PowerSploit will now stay true to its roots of being a purely offensive PowerShell module.
2013-11-13Normalized all scripts to ASCII encodingmattifestation1-2/+2
2013-08-29Added ProcessModuleTrace cmdletsmattifestation1-0/+103
Added *-ProcessModuleTrace cmdlets to trace details when modules are loaded into a process. These can be useful for malware analysis.