Add: hlldz/RefleXXion to Defense Evasion section

This commit is contained in:
pe3zx 2022-01-26 15:34:17 +07:00
parent 449ed1a563
commit a00b0de543

View File

@ -1320,6 +1320,10 @@ Some tools can be categorized in more than one category. But because the current
<td><a href="https://github.com/hlldz/Invoke-Phant0m">hlldz/Invoke-Phant0m</a></td> <td><a href="https://github.com/hlldz/Invoke-Phant0m">hlldz/Invoke-Phant0m</a></td>
<td>Windows Event Log Killer</td> <td>Windows Event Log Killer</td>
</tr> </tr>
<tr>
<td><a href="https://github.com/hlldz/RefleXXion">hlldz/RefleXXion</a></td>
<td>RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array.</td>
</tr>
<tr> <tr>
<td><a href="https://github.com/huntresslabs/evading-autoruns">huntresslabs/evading-autoruns</a></td> <td><a href="https://github.com/huntresslabs/evading-autoruns">huntresslabs/evading-autoruns</a></td>
<td>Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)</td> <td>Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)</td>