From 014a7bb421477a18add25164d71e977574832c14 Mon Sep 17 00:00:00 2001 From: Matt Graeber Date: Fri, 5 Apr 2013 14:06:58 -0400 Subject: Adding Invoke-ShellcodeMSIL Invoke-ShellcodeMSIL executes shellcode without making any Win32 function calls. --- README.md | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'README.md') diff --git a/README.md b/README.md index 1539525..372f09a 100644 --- a/README.md +++ b/README.md @@ -12,6 +12,10 @@ Injects a Dll into the process ID of your choosing. Injects shellcode into the process ID of your choosing or within PowerShell locally. +#### `Invoke-ShellcodeMSIL` + +Execute shellcode within the context of the running PowerShell process without making any Win32 function calls. + ## ScriptModification **Modify and/or prepare scripts for execution on a compromised machine.** -- cgit v1.2.3