From d3e9452b2aefa3760f8f9acde79da041acd5756e Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 9 Feb 2022 11:56:33 +0700 Subject: [PATCH] Add: ORCA666/snaploader to Defense Evasion section --- Offensive.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Offensive.md b/Offensive.md index 35314f4..18bc976 100644 --- a/Offensive.md +++ b/Offensive.md @@ -1576,6 +1576,10 @@ Some tools can be categorized in more than one category. But because the current ORCA666/EVA3 using hellsgate in EVA to get the syscalls + + ORCA666/snaploader + Injecting shellcode into 'ntdll.dll' address space in target process, and hijacking its thread without calling GetThreadContext, evading memory scanners, and more ... + ORCA666/T.D.P Using Thread Description To Hide Shellcode