Skip to content
This repository was archived by the owner on Jan 21, 2021. It is now read-only.

Commit 80ffa19

Browse files
author
mattifestation
committed
Removing Watch-BlueScreen
This vulnerability was patched a while ago making this function largely irrelevant.
1 parent 3444a07 commit 80ffa19

File tree

3 files changed

+1
-83
lines changed

3 files changed

+1
-83
lines changed

CodeExecution/CodeExecution.psd1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ ModuleList = @(@{ModuleName = 'CodeExecution'; ModuleVersion = '1.0.0.0'; GUID =
7474

7575
# List of all files packaged with this module
7676
FileList = 'CodeExecution.psm1', 'CodeExecution.psd1', 'Invoke-Shellcode.ps1', 'Invoke-DllInjection.ps1',
77-
'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Watch-BlueScreen.ps1', 'Usage.md'
77+
'Invoke-ShellcodeMSIL.ps1', 'Invoke-ReflectivePEInjection.ps1', 'Usage.md'
7878

7979
# Private data to pass to the module specified in RootModule/ModuleToProcess
8080
# PrivateData = ''

CodeExecution/Watch-BlueScreen.ps1

Lines changed: 0 additions & 78 deletions
This file was deleted.

README.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,6 @@ Injects shellcode into the process ID of your choosing or within PowerShell loca
2020

2121
Execute shellcode within the context of the running PowerShell process without making any Win32 function calls.
2222

23-
#### `Watch-BlueScreen`
24-
25-
Cause a blue screen to occur (Windows 7 and below).
26-
2723
## ScriptModification
2824

2925
**Modify and/or prepare scripts for execution on a compromised machine.**

0 commit comments

Comments
 (0)