diff --git a/Offensive.md b/Offensive.md
index 195a68a..0e68c13 100644
--- a/Offensive.md
+++ b/Offensive.md
@@ -768,6 +768,10 @@ Some tools can be categorized in more than one category. But because the current
asaurusrex/EDR_Userland_Hook_Checker |
Project to check which Nt/Zw functions your local EDR is hooking |
+
+ audibleblink/dummyDLL |
+ Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed. |
+
AzAgarampur/byeintegrity4-uac |
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers |