diff --git a/Offensive.md b/Offensive.md
index 18bc976..cb3e3aa 100644
--- a/Offensive.md
+++ b/Offensive.md
@@ -2297,6 +2297,10 @@ Some tools can be categorized in more than one category. But because the current
theepicpowner/dcom_av_exec |
DCOM_AV_EXEC allows for "diskless" lateral movement to a target on the same network via DCOM. The AV_Bypass_Framework_V3 creates a .NET shellcode runner (output as DLL) which can be used with the DCOM_AV_EXEC tool to bypass antivirus solutions like Microsoft Defender as all shellcode is AES encrypted and executed in memory. |
+
+ /whydee86/SnD_AMSI |
+ Start new PowerShell without etw and amsi in pure nim |
+
## Collection