mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-01-23 22:11:05 -05:00
Add: boku7/winx64-InjectAllProcessesMeterpreter-Shellcode to Execution section
This commit is contained in:
parent
06df2b91dc
commit
e50eb47df6
@ -243,6 +243,10 @@ Some tools can be categorized in more than one category. But because the current
|
||||
<td><a href="https://github.com/boku7/CobaltStrikeReflectiveLoader">boku7/CobaltStrikeReflectiveLoader</a></td>
|
||||
<td>Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/boku7/winx64-InjectAllProcessesMeterpreter-Shellcode">boku7/winx64-InjectAllProcessesMeterpreter-Shellcode</a></td>
|
||||
<td>64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/bytecode77/self-morphing-csharp-binary">bytecode77/self-morphing-csharp-binary</a></td>
|
||||
<td>Executable that mutates its own code</td>
|
||||
|
Loading…
Reference in New Issue
Block a user