Add: knight0x07/ImpulsiveDLLHijack to Execution section

This commit is contained in:
pe3zx 2021-09-15 10:03:27 +07:00
parent 46524f3ac1
commit 12e94d3df3

View File

@ -353,6 +353,10 @@ Some tools can be categorized in more than one category. But because the current
<td><a href="https://github.com/jfmaes/SharpZipRunner">jfmaes/SharpZipRunner</a></td>
<td>Executes position independent shellcode from an encrypted zip</td>
</tr>
<tr>
<td><a href="https://github.com/knight0x07/ImpulsiveDLLHijack">knight0x07/ImpulsiveDLLHijack</a></td>
<td>C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.</td>
</tr>
<tr>
<td><a href="https://github.com/mai1zhi2/SharpBeacon">mai1zhi2/SharpBeacon</a></td>
<td>CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能</td>