From 80ffa19fa37399d857ecebea1fe821f3171b7967 Mon Sep 17 00:00:00 2001 From: mattifestation Date: Thu, 19 Jun 2014 20:16:26 -0400 Subject: Removing Watch-BlueScreen This vulnerability was patched a while ago making this function largely irrelevant. --- CodeExecution/CodeExecution.psd1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'CodeExecution/CodeExecution.psd1') diff --git a/CodeExecution/CodeExecution.psd1 b/CodeExecution/CodeExecution.psd1 index 07963fc..85258a5 100644 --- a/CodeExecution/CodeExecution.psd1 +++ b/CodeExecution/CodeExecution.psd1 @@ -74,7 +74,7 @@ ModuleList = @(@{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID = # List of all files packaged with this module FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', 'Invoke-DllInjection.ps1', - 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Watch-BlueScreen.ps1', 'Usage.md' + 'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Usage.md' # Private data to pass to the module specified in RootModule/ModuleToProcess # PrivateData = '' -- cgit v1.2.3