diff --git a/Offensive.md b/Offensive.md
index 46b7928..6f4a0ae 100644
--- a/Offensive.md
+++ b/Offensive.md
@@ -561,6 +561,10 @@ Some tools can be categorized in more than one category. But because the current
asaurusrex/DoppelGate |
This project is designed to provide a method of extracting syscalls dynamically directly from on-disk ntdll. Userland hooks have become prevalent in many security products these days, and bypassing these hooks is a great way for red teamers/pentesters to bypass these defenses. |
+
+ asaurusrex/EDR_Userland_Hook_Checker |
+ Project to check which Nt/Zw functions your local EDR is hooking |
+
bats3c/Ghost-In-The-Logs |
Evade sysmon and windows event logginEvade sysmon and windows event loggingg |