Add: kkent030315/anycall to Execution section

This commit is contained in:
pe3zx 2021-10-21 11:16:13 +07:00
parent 02c7024a69
commit 7b2e1cf92b

View File

@ -357,6 +357,10 @@ Some tools can be categorized in more than one category. But because the current
<td><a href="https://github.com/jfmaes/SharpZipRunner">jfmaes/SharpZipRunner</a></td>
<td>Executes position independent shellcode from an encrypted zip</td>
</tr>
<tr>
<td><a href="https://github.com/kkent030315/anycall">kkent030315/anycall</a></td>
<td>x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration</td>
</tr>
<tr>
<td><a href="https://github.com/knight0x07/ImpulsiveDLLHijack">knight0x07/ImpulsiveDLLHijack</a></td>
<td>C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.</td>