From 76c406f1f9a5e1d7bf0289128ed622dbfd30ad29 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Tue, 20 Apr 2021 15:35:33 +0700 Subject: [PATCH] Add: praetorian-inc/Matryoshka to Execution section --- Offensive.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Offensive.md b/Offensive.md index 0c49760..e2ccd63 100644 --- a/Offensive.md +++ b/Offensive.md @@ -456,6 +456,10 @@ Some tools can be categorized in more than one category. But because the current postrequest/xeca PowerShell payload generator + + praetorian-inc/Matryoshka + Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads. + redcanaryco/chain-reactor Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and