From 7b2e1cf92b8d421964302e047d0690c8e43d63e8 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Thu, 21 Oct 2021 11:16:13 +0700 Subject: [PATCH] Add: kkent030315/anycall to Execution section --- Offensive.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Offensive.md b/Offensive.md index 2d07c2d..6ef6892 100644 --- a/Offensive.md +++ b/Offensive.md @@ -357,6 +357,10 @@ Some tools can be categorized in more than one category. But because the current jfmaes/SharpZipRunner Executes position independent shellcode from an encrypted zip + + kkent030315/anycall + x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration + knight0x07/ImpulsiveDLLHijack C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.