mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-09-28 18:25:35 +00:00
Add: Moriarty2016/NimRDI to Execution section
This commit is contained in:
parent
e03d2933bf
commit
99b534b35f
@ -456,6 +456,10 @@ Some tools can be categorized in more than one category. But because the current
|
|||||||
<td><a href="https://github.com/monoxgas/sRDI">monoxgas/sRDI</a></td>
|
<td><a href="https://github.com/monoxgas/sRDI">monoxgas/sRDI</a></td>
|
||||||
<td>Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode</td>
|
<td>Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/Moriarty2016/NimRDI">Moriarty2016/NimRDI</a></td>
|
||||||
|
<td>RDI implementation in Nim</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="https://github.com/passthehashbrowns/DInvokeProcessHollowing">passthehashbrowns/DInvokeProcessHollowing</a></td>
|
<td><a href="https://github.com/passthehashbrowns/DInvokeProcessHollowing">passthehashbrowns/DInvokeProcessHollowing</a></td>
|
||||||
<td>This repository is an implementation of process hollowing shellcode injection using DInvoke from SharpSploit. DInvoke allows operators to use unmanaged code while avoiding suspicious imports or API hooking.</td>
|
<td>This repository is an implementation of process hollowing shellcode injection using DInvoke from SharpSploit. DInvoke allows operators to use unmanaged code while avoiding suspicious imports or API hooking.</td>
|
||||||
|
Loading…
Reference in New Issue
Block a user