PowerSploit/CodeExecution
clymb3r 03b8d5c6b4 Bug fixes to Invoke-ReflectivePEInjection
Fixed a bug where calling GetProcAddress by ordinal instead of procedure
name failed.
Fixed a bug where reflectively loading an EXE will cause the entry
function (main()) to be called twice instead of once as expected.
Added a ForceASLR flag to force ASLR to be used even if the PE file
doesn't officially support ASLR.
Some minor other changes.
2014-07-10 22:40:01 -07:00
..
Invoke-ReflectivePEInjection_Resources Added Invoke-ReflectivePEInjection 2013-05-31 19:35:26 -04:00
CodeExecution.psd1 Normalized all scripts to ASCII encoding 2013-11-13 21:01:02 -05:00
CodeExecution.psm1 Normalized all scripts to ASCII encoding 2013-11-13 21:01:02 -05:00
Invoke-DllInjection.ps1 Normalized all scripts to ASCII encoding 2013-11-13 21:01:02 -05:00
Invoke-ReflectivePEInjection.ps1 Bug fixes to Invoke-ReflectivePEInjection 2014-07-10 22:40:01 -07:00
Invoke-Shellcode.ps1 Updated 64-32bit conversion logic for Metasploit 2013-02-17 18:12:56 -05:00
Invoke-ShellcodeMSIL.ps1 Normalized all scripts to ASCII encoding 2013-11-13 21:01:02 -05:00
Usage.md Added 'CodeExecution' Module 2013-01-20 21:34:37 -05:00
Watch-BlueScreen.ps1 Normalized all scripts to ASCII encoding 2013-11-13 21:01:02 -05:00