mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-01-09 06:48:04 -05:00
Add: kkent030315/anycall to Execution section
This commit is contained in:
parent
02c7024a69
commit
7b2e1cf92b
@ -357,6 +357,10 @@ Some tools can be categorized in more than one category. But because the current
|
||||
<td><a href="https://github.com/jfmaes/SharpZipRunner">jfmaes/SharpZipRunner</a></td>
|
||||
<td>Executes position independent shellcode from an encrypted zip</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/kkent030315/anycall">kkent030315/anycall</a></td>
|
||||
<td>x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/knight0x07/ImpulsiveDLLHijack">knight0x07/ImpulsiveDLLHijack</a></td>
|
||||
<td>C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.</td>
|
||||
|
Loading…
Reference in New Issue
Block a user