From fac26eab8767535cc687cb19b173823d6b2a2661 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Tue, 31 Aug 2021 10:53:02 +0700 Subject: [PATCH] Add: darkr4y/geacon to Execution section --- Offensive.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/Offensive.md b/Offensive.md index 368ce0c..cadd4d6 100644 --- a/Offensive.md +++ b/Offensive.md @@ -281,14 +281,17 @@ Some tools can be categorized in more than one category. But because the current cube0x0/SharpeningCobaltStrike I realtime v35/40 dotnet compiler for your linux Cobalt Strike C2. New fresh compiled and obfuscated binary for each use + + D00MFist/Go4aRun + Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process + DamonMohammadbagher/NativePayload_Tinjection Remote Thread Injection by C# - D00MFist/Go4aRun - Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and - spoofed parent process + darkr4y/geacon + Practice Go programming and implement CobaltStrike's Beacon in Go dtrizna/easy-hollow