diff --git a/Offensive.md b/Offensive.md index 195a68a..0e68c13 100644 --- a/Offensive.md +++ b/Offensive.md @@ -768,6 +768,10 @@ Some tools can be categorized in more than one category. But because the current asaurusrex/EDR_Userland_Hook_Checker Project to check which Nt/Zw functions your local EDR is hooking + + audibleblink/dummyDLL + Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed. + AzAgarampur/byeintegrity4-uac Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers