Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can not work! #3

Open
AhrendsSchmidt opened this issue Apr 29, 2021 · 1 comment
Open

Can not work! #3

AhrendsSchmidt opened this issue Apr 29, 2021 · 1 comment

Comments

@AhrendsSchmidt
Copy link

image
When I entered the command, nothing happened, there was no output and no errors were reported.
So what happened?

@tomkallo
Copy link

tomkallo commented Apr 14, 2022

I know this is an old issue but easily resolved. You need to do the following -

  1. powershell.exe -ExecutionPolicy Bypass
  2. . .\Get-PotentialDLLHijack.ps1
  3. Get-PotentialDLLHijack -CSVPath .\Logfile.CSV -MaliciousDLLPath .\DLLHijackTest.dll -ProcessPath "C:\Users\user\AppData\Local\Microsoft\etc"

You haven't actually loaded it in.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants