mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-01-25 06:46:46 -05:00
Add: VirtualAllocEx/Payload-Download-Cradles to Defense Evasion section
This commit is contained in:
parent
9d1a5b3484
commit
b01ff82bef
@ -1837,6 +1837,10 @@ Some tools can be categorized in more than one category. But because the current
|
||||
<td><a href="https://github.com/Unknow101/FuckThatPacker">Unknow101/FuckThatPacker</a></td>
|
||||
<td>A simple python packer to easily bypass Windows Defender</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/VirtualAlllocEx/Payload-Download-Cradles">VirtualAlllocEx/Payload-Download-Cradles</a></td>
|
||||
<td>This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/VirtualAlllocEx/Shellcode-Downloader-CreateThread-Execution">VirtualAlllocEx/Shellcode-Downloader-CreateThread-Execution</a></td>
|
||||
<td>This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.</td>
|
||||
|
Loading…
Reference in New Issue
Block a user