diff --git a/Offensive.md b/Offensive.md
index b56b343..10d9885 100644
--- a/Offensive.md
+++ b/Offensive.md
@@ -466,6 +466,10 @@ Some tools can be categorized in more than one category. But because the current
Arvanaghi/CheckPlease |
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust. |
+
+ asaurusrex/DoppelGate |
+ This project is designed to provide a method of extracting syscalls dynamically directly from on-disk ntdll. Userland hooks have become prevalent in many security products these days, and bypassing these hooks is a great way for red teamers/pentesters to bypass these defenses. |
+
bats3c/Ghost-In-The-Logs |
Evade sysmon and windows event logginEvade sysmon and windows event loggingg |