BH12139 | Attaches debugger to another process on local or remote computer. | |
BH12140 | Attaches debugger to local or remote runspaces. | |
BH12306 | Does just-in-time compiling or code rewriting. | |
BH12307 | Does process injection into the Chrome executable. | |
BH12308 | Does process injection into the Chromium executable. | |
BH12309 | Does process injection into the Firefox executable. | |
BH12310 | Does process injection into the Internet Explorer executable. | |
BH12311 | Does process injection into the Netscape executable. | |
BH12312 | Does process injection into the Opera executable. | |
BH12313 | Does process injection into the Safari executable. | |
BH12314 | Does process injection into the Service Host Process executable. | |
BH12315 | Does process injection into the Windows Command Processor executable. | |
BH12316 | Does process injection into the Windows Explorer executable. | |
BH12350 | Executes shellcode within the current process. | |
BH12354 | Exports commands from another PowerShell session. | |
BH12367 | Imports commands from another PowerShell session. | |
BH12471 | Reads from other process' memory. | |
BH12821 | Writes to other process' memory. | |
BH13158 | Does process injection into the Windows Local Security Authority Subsystem Service executable. | |
BH13227 | Accesses information about virtual memory regions of the current process. | |
BH13228 | Accesses information about virtual memory regions of a process. | |
BH13229 | Reads data from the process's own memory through the /proc/self/mem pseudo-file. | |
BH13230 | Writes data to the process's own memory through the /proc/self/mem pseudo-file. | |
BH13231 | Reads data from other process' memory through the 'mem' pseudo-file. | |
BH13232 | Writes data to other process' memory through the 'mem' pseudo-file. | |
BH19106 | Enumerates active runspaces within a Windows PowerShell host process. | |
BH19284 | Enumerates stored command history. | |
BH20228 | Uses PowerSploit/Empire command to generate a full-memory minidump of a process. | |
BH20321 | Uses PowerSploit/Empire DLL injection command to inject a DLL into a process. | |
BH20322 | Uses PowerSploit/Empire injection command to reflectively load a PE file in the PowerShell process, or reflectively inject a DLL into a remote process. | |
BH20323 | Uses PowerSploit/Empire injection command which executes PowerShell commands from memory in a remote process. | |
BH20324 | Uses PowerSploit/Empire shellcode injection command to inject MSIL shellcode into a process. | |
BH20325 | Uses PowerSploit/Empire shellcode injection command to inject shellcode into a process. | |