diff --git a/Offensive.md b/Offensive.md index b56b343..10d9885 100644 --- a/Offensive.md +++ b/Offensive.md @@ -466,6 +466,10 @@ Some tools can be categorized in more than one category. But because the current Arvanaghi/CheckPlease Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust. + + asaurusrex/DoppelGate + This project is designed to provide a method of extracting syscalls dynamically directly from on-disk ntdll. Userland hooks have become prevalent in many security products these days, and bypassing these hooks is a great way for red teamers/pentesters to bypass these defenses. + bats3c/Ghost-In-The-Logs Evade sysmon and windows event logginEvade sysmon and windows event loggingg