From 40eb187bca6a985ce7d24b19ac54c47ade285858 Mon Sep 17 00:00:00 2001 From: bitform Date: Mon, 21 Jan 2013 08:33:51 -0500 Subject: Consistency improvements in comment-based help --- CodeExecution/Invoke-DllInjection.ps1 | 2 +- CodeExecution/Invoke-Shellcode.ps1 | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'CodeExecution') diff --git a/CodeExecution/Invoke-DllInjection.ps1 b/CodeExecution/Invoke-DllInjection.ps1 index b62e7a1..572a911 100644 --- a/CodeExecution/Invoke-DllInjection.ps1 +++ b/CodeExecution/Invoke-DllInjection.ps1 @@ -5,7 +5,7 @@ function Invoke-DllInjection Injects a Dll into the process ID of your choosing. -PowerSploit Module - Invoke-DllInjection +PowerSploit Function: Invoke-DllInjection Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None diff --git a/CodeExecution/Invoke-Shellcode.ps1 b/CodeExecution/Invoke-Shellcode.ps1 index e23c0f9..4f59f3b 100644 --- a/CodeExecution/Invoke-Shellcode.ps1 +++ b/CodeExecution/Invoke-Shellcode.ps1 @@ -5,7 +5,7 @@ function Invoke-Shellcode Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process. -PowerSploit Module - Invoke-Shellcode +PowerSploit Function: Invoke-Shellcode Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause Required Dependencies: None -- cgit v1.2.3