mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-10-01 07:45:36 -04:00
Add: xforcered/InlineExecute-Assembly to Execution section
This commit is contained in:
parent
f098a85df6
commit
bb7f000877
@ -373,6 +373,10 @@ Some tools can be categorized in more than one category. But because the current
|
|||||||
<td><a href="https://github.com/snovvcrash/peas">snovvcrash/peas</a></td>
|
<td><a href="https://github.com/snovvcrash/peas">snovvcrash/peas</a></td>
|
||||||
<td>Modified version of PEAS client for offensive operations</td>
|
<td>Modified version of PEAS client for offensive operations</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/xforcered/InlineExecute-Assembly">xforcered/InlineExecute-Assembly</a></td>
|
||||||
|
<td>InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="https://github.com/xinbailu/DripLoader">xinbailu/DripLoader</a></td>
|
<td><a href="https://github.com/xinbailu/DripLoader">xinbailu/DripLoader</a></td>
|
||||||
<td>Evasive shellcode loader for bypassing event-based injection detection (PoC)</td>
|
<td>Evasive shellcode loader for bypassing event-based injection detection (PoC)</td>
|
||||||
|
Loading…
Reference in New Issue
Block a user