mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-01-23 22:11:05 -05:00
Add: ChaitanyaHaritash/Callback_Shellcode_Injection to Execution section
This commit is contained in:
parent
cf0c6e087d
commit
0aff78cffd
@ -267,14 +267,17 @@ Some tools can be categorized in more than one category. But because the current
|
||||
<td><a href="https://ChadSki/SharpNeedle">ChadSki/SharpNeedle</a></td>
|
||||
<td>Inject C# code into a running process</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/ChaitanyaHaritash/Callback_Shellcode_Injection">ChaitanyaHaritash/Callback_Shellcode_Injection</a></td>
|
||||
<td>POCs for Shellcode Injection via Callbacks</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/checkymander/Sharp-SMBExec">checkymander/Sharp-SMBExec</a></td>
|
||||
<td>SMBExec C# module</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/checkymander/Zolom">checkymander/Zolom</a></td>
|
||||
<td>C# Executable with embedded Python that can be used reflectively to run python code on systems without
|
||||
Python installed</td>
|
||||
<td>C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/cobbr/SharpSploit">cobbr/SharpSploit</a></td>
|
||||
|
Loading…
Reference in New Issue
Block a user