Add TheWover/GhostLoader to Execution

This commit is contained in:
pe3zx 2021-01-27 16:33:35 +07:00
parent 6a6e35318c
commit c47fe0e72c

View File

@ -290,6 +290,10 @@ Some tools can be categorized in more than one category. But because the current
<td>A port of FuzzySecurity's UrbanBishop project for inline shellcode execution. The execution vector uses a
delegate vs an APC on a suspended threat at ntdll!RtlExitUserThread in UrbanBishop</td>
</tr>
<tr>
<td><a href="https://github.com/TheWover/GhostLoader">TheWover/GhostLoader</a></td>
<td>GhostLoader - AppDomainManager - Injection - 攻壳机动队</td>
</tr>
<tr>
<td><a href="https://github.com/r3nhat/XORedReflectiveDLL">r3nhat/XORedReflectiveDLL</a></td>
<td>Reflective DLL Injection with obfuscated (XOR) shellcode</td>