From 0aff78cffdfc985fbced6653e850a24f4c854dbf Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 27 Oct 2021 13:45:11 +0700 Subject: [PATCH] Add: ChaitanyaHaritash/Callback_Shellcode_Injection to Execution section --- Offensive.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/Offensive.md b/Offensive.md index 65c0700..f74ec72 100644 --- a/Offensive.md +++ b/Offensive.md @@ -267,14 +267,17 @@ Some tools can be categorized in more than one category. But because the current ChadSki/SharpNeedle Inject C# code into a running process + + ChaitanyaHaritash/Callback_Shellcode_Injection + POCs for Shellcode Injection via Callbacks + checkymander/Sharp-SMBExec SMBExec C# module checkymander/Zolom - C# Executable with embedded Python that can be used reflectively to run python code on systems without - Python installed + C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed cobbr/SharpSploit