diff --git a/Offensive.md b/Offensive.md index 18bc976..cb3e3aa 100644 --- a/Offensive.md +++ b/Offensive.md @@ -2297,6 +2297,10 @@ Some tools can be categorized in more than one category. But because the current theepicpowner/dcom_av_exec DCOM_AV_EXEC allows for "diskless" lateral movement to a target on the same network via DCOM. The AV_Bypass_Framework_V3 creates a .NET shellcode runner (output as DLL) which can be used with the DCOM_AV_EXEC tool to bypass antivirus solutions like Microsoft Defender as all shellcode is AES encrypted and executed in memory. + + /whydee86/SnD_AMSI + Start new PowerShell without etw and amsi in pure nim + ## Collection