diff --git a/Offensive.md b/Offensive.md index 46b7928..6f4a0ae 100644 --- a/Offensive.md +++ b/Offensive.md @@ -561,6 +561,10 @@ Some tools can be categorized in more than one category. But because the current asaurusrex/DoppelGate This project is designed to provide a method of extracting syscalls dynamically directly from on-disk ntdll. Userland hooks have become prevalent in many security products these days, and bypassing these hooks is a great way for red teamers/pentesters to bypass these defenses. + + asaurusrex/EDR_Userland_Hook_Checker + Project to check which Nt/Zw functions your local EDR is hooking + bats3c/Ghost-In-The-Logs Evade sysmon and windows event logginEvade sysmon and windows event loggingg