From ce8f703d80a214270a3dc20439ad2f3b62bac073 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Tue, 24 Nov 2020 21:19:01 +0700 Subject: [PATCH] Add bats3c/Ghost-In-The-Logs --- Offensive.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Offensive.md b/Offensive.md index a010625..296bd19 100644 --- a/Offensive.md +++ b/Offensive.md @@ -445,6 +445,10 @@ Some tools can be categorized in more than one category. But because the current Arvanaghi/CheckPlease Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust. + + bats3c/Ghost-In-The-Logs + Evade sysmon and windows event logginEvade sysmon and windows event loggingg + bhumic/PErmutator The goal of this project is to create a permutation engine for PE files. The engine should randomize the executable parts of the file.