You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 21, 2021. It is now read-only.
Blog on reflective loading: http://clymb3r.wordpress.com/2013/04/06/reflective-dll-injection-with-powershell/
160
158
Blog on modifying mimikatz for reflective loading: http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/
161
159
Blog on using this script as a backdoor with SQL server: http://www.casaba.com/blog/
Blog on reflective loading: http://clymb3r.wordpress.com/2013/04/06/reflective-dll-injection-with-powershell/
72
-
Blog on modifying mimikatz for reflective loading: http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/
Copy file name to clipboardexpand all lines: Exfiltration/Invoke-TokenManipulation.ps1
-2
Original file line number
Diff line number
Diff line change
@@ -49,8 +49,6 @@ Author: Joe Bialek, Twitter: @JosephBialek
49
49
License: BSD 3-Clause
50
50
Required Dependencies: None
51
51
Optional Dependencies: None
52
-
Version: 1.12
53
-
(1.11 -> 1.12: Simple logic added by Josh M. Bryant to find an unprotected process to grab a SYSTEM token from, rather than hardcoding to wininit, https://www.fixtheexchange.com/)
0 commit comments