mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-11 17:14:21 -05:00
Add: boku7/Ninja_UUID_Dropper to Execution section
This commit is contained in:
parent
a0ea97ad56
commit
a8cbe54912
@ -529,6 +529,10 @@ Some tools can be categorized in more than one category. But because the current
|
|||||||
<td><a href="https://github.com/boku7/HOLLOW">boku7/HOLLOW</a></td>
|
<td><a href="https://github.com/boku7/HOLLOW">boku7/HOLLOW</a></td>
|
||||||
<td>EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode</td>
|
<td>EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/boku7/Ninja_UUID_Dropper">boku7/Ninja_UUID_Dropper</a></td>
|
||||||
|
<td>Module Stomping, No New Thread, HellsGate syscaller, UUID Dropper for x64 Windows 10!</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="https://github.com/boku7/spawn">boku7/spawn</a></td>
|
<td><a href="https://github.com/boku7/spawn">boku7/spawn</a></td>
|
||||||
<td>Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.</td>
|
<td>Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.</td>
|
||||||
|
Loading…
Reference in New Issue
Block a user