Add: VirtualAllocEx/Payload-Download-Cradles to Defense Evasion section

This commit is contained in:
pe3zx 2022-03-30 14:34:57 +07:00
parent 9d1a5b3484
commit b01ff82bef

View File

@ -1837,6 +1837,10 @@ Some tools can be categorized in more than one category. But because the current
<td><a href="https://github.com/Unknow101/FuckThatPacker">Unknow101/FuckThatPacker</a></td>
<td>A simple python packer to easily bypass Windows Defender</td>
</tr>
<tr>
<td><a href="https://github.com/VirtualAlllocEx/Payload-Download-Cradles">VirtualAlllocEx/Payload-Download-Cradles</a></td>
<td>This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.</td>
</tr>
<tr>
<td><a href="https://github.com/VirtualAlllocEx/Shellcode-Downloader-CreateThread-Execution">VirtualAlllocEx/Shellcode-Downloader-CreateThread-Execution</a></td>
<td>This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.</td>