From c47fe0e72cde1583dd5c4a8def68d3dd9da87e91 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 27 Jan 2021 16:33:35 +0700 Subject: [PATCH] Add TheWover/GhostLoader to Execution --- Offensive.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Offensive.md b/Offensive.md index 464251f..7222fc9 100644 --- a/Offensive.md +++ b/Offensive.md @@ -290,6 +290,10 @@ Some tools can be categorized in more than one category. But because the current A port of FuzzySecurity's UrbanBishop project for inline shellcode execution. The execution vector uses a delegate vs an APC on a suspended threat at ntdll!RtlExitUserThread in UrbanBishop + + TheWover/GhostLoader + GhostLoader - AppDomainManager - Injection - 攻壳机动队 + r3nhat/XORedReflectiveDLL Reflective DLL Injection with obfuscated (XOR) shellcode