Add: boku7/Ninja_UUID_Dropper to Execution section

This commit is contained in:
pe3zx 2021-10-06 14:22:54 +07:00
parent a0ea97ad56
commit a8cbe54912

View File

@ -529,6 +529,10 @@ Some tools can be categorized in more than one category. But because the current
<td><a href="https://github.com/boku7/HOLLOW">boku7/HOLLOW</a></td> <td><a href="https://github.com/boku7/HOLLOW">boku7/HOLLOW</a></td>
<td>EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode</td> <td>EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode</td>
</tr> </tr>
<tr>
<td><a href="https://github.com/boku7/Ninja_UUID_Dropper">boku7/Ninja_UUID_Dropper</a></td>
<td>Module Stomping, No New Thread, HellsGate syscaller, UUID Dropper for x64 Windows 10!</td>
</tr>
<tr> <tr>
<td><a href="https://github.com/boku7/spawn">boku7/spawn</a></td> <td><a href="https://github.com/boku7/spawn">boku7/spawn</a></td>
<td>Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.</td> <td>Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.</td>