From 18b7a10f89eb5f1038c443b5b39d3a8e327fb090 Mon Sep 17 00:00:00 2001 From: Matt Graeber Date: Thu, 5 Nov 2015 13:26:05 -0500 Subject: Removing Invoke-ShellcodeMSIL This was only ever intended to be a PoC. I'll bring this back if requested but it exhibits duplicate functionality. --- README.md | 4 ---- 1 file changed, 4 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index 4761e00..dcbd989 100644 --- a/README.md +++ b/README.md @@ -18,10 +18,6 @@ Reflectively loads a Windows PE file (DLL/EXE) in to the powershell process, or Injects shellcode into the process ID of your choosing or within PowerShell locally. -#### `Invoke-ShellcodeMSIL` - -Execute shellcode within the context of the running PowerShell process without making any Win32 function calls. - #### `Invoke-WmiCommand` Executes a PowerShell ScriptBlock on a target computer and returns its formatted output using WMI as a C2 channel. -- cgit v1.2.3