From e50eb47df669ad8b7949fe10b4d49561bbaf27ab Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 8 Sep 2021 12:56:14 +0700 Subject: [PATCH] Add: boku7/winx64-InjectAllProcessesMeterpreter-Shellcode to Execution section --- Offensive.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Offensive.md b/Offensive.md index 27eca11..3bd7acc 100644 --- a/Offensive.md +++ b/Offensive.md @@ -243,6 +243,10 @@ Some tools can be categorized in more than one category. But because the current boku7/CobaltStrikeReflectiveLoader Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities. + + boku7/winx64-InjectAllProcessesMeterpreter-Shellcode + 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells. + bytecode77/self-morphing-csharp-binary Executable that mutates its own code