From 03ed2adb56a608a6e10cda8b924d76f5a3f0147f Mon Sep 17 00:00:00 2001 From: Matt Graeber Date: Wed, 23 Sep 2015 15:25:39 -0700 Subject: Adding Invoke-WmiCommand --- README.md | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'README.md') diff --git a/README.md b/README.md index ed32e05..4761e00 100644 --- a/README.md +++ b/README.md @@ -22,6 +22,10 @@ Injects shellcode into the process ID of your choosing or within PowerShell loca Execute shellcode within the context of the running PowerShell process without making any Win32 function calls. +#### `Invoke-WmiCommand` + +Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel. + ## ScriptModification **Modify and/or prepare scripts for execution on a compromised machine.** -- cgit v1.2.3