Dargslan.WinCOMHijack.psd1
|
@{ RootModule = 'Dargslan.WinCOMHijack.psm1' ModuleVersion = '2.0.0' GUID = 'ae8db33c-9aa2-49e7-8702-71e275816b5f' Author = 'Dargslan' CompanyName = 'Dargslan' Copyright = '(c) 2026 Dargslan. All rights reserved.' Description = 'COM hijacking detection toolkit — orphaned CLSIDs, suspicious InprocServer32 entries, phantom COM objects, and DLL side-loading risks' PowerShellVersion = '5.1' FunctionsToExport = @('Get-COMHijackAudit') CmdletsToExport = @() VariablesToExport = @() AliasesToExport = @() PrivateData = @{ PSData = @{ Tags = @('com-hijack', 'clsid', 'dll-sideload', 'phantom', 'detection', 'security', 'sysadmin', 'dargslan', '2026') LicenseUri = 'https://github.com/Dargslan/powershell-admin-scripts/blob/main/LICENSE' ProjectUri = 'https://dargslan.com' IconUri = 'https://dargslan.com/assets/img/dargslan-icon.png' ReleaseNotes = '2026 Edition — Part of the Dargslan Windows Admin Toolkit. Visit https://dargslan.com' } } } |