mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-10-01 07:45:36 -04:00
Add: netero1010/RDPHijack-BOF to Lateral Movement section
This commit is contained in:
parent
a5e30ae17b
commit
e8661898d6
@ -2521,6 +2521,10 @@ Some tools can be categorized in more than one category. But because the current
|
|||||||
<td><a href="https://github.com/Mr-Un1k0d3r/SCShell">Mr-Un1k0d3r/SCShell</a></td>
|
<td><a href="https://github.com/Mr-Un1k0d3r/SCShell">Mr-Un1k0d3r/SCShell</a></td>
|
||||||
<td>Fileless lateral movement tool that relies on ChangeServiceConfigA to run command</td>
|
<td>Fileless lateral movement tool that relies on ChangeServiceConfigA to run command</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/netero1010/RDPHijack-BOF">netero1010/RDPHijack-BOF</a></td>
|
||||||
|
<td>Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="https://github.com/netero1010/ServiceMove-BOF">netero1010/ServiceMove-BOF</a></td>
|
<td><a href="https://github.com/netero1010/ServiceMove-BOF">netero1010/ServiceMove-BOF</a></td>
|
||||||
<td>New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.</td>
|
<td>New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.</td>
|
||||||
|
Loading…
Reference in New Issue
Block a user