Skip to content

Commit f0ad0b8

Browse files
committed
add reflective ntdll
1 parent 704052c commit f0ad0b8

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

Bypass-AV.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,6 +209,8 @@ markmap:
209209
210210
- <https://www.ired.team/offensive-security/code-injection-process-injection/process-hollowing-and-pe-image-relocations#relocation>
211211
- <https://sevrosecurity.com/2020/04/08/process-injection-part-1-createremotethread/>
212+
- <https://0xsp.com/security%20research%20%20development%20srd/defeat-the-castle-bypass-av-advanced-xdr-solutions/>
213+
- <https://github.com/0xsp-SRD/mortar>
212214
213215
### Thread execution hijacking
214216
@@ -225,7 +227,9 @@ markmap:
225227
- Reflective dll injection
226228
- <https://disman.tl/2015/01/30/an-improved-reflective-dll-injection-technique.html>
227229
- <https://github.com/fancycode/MemoryModule>
228-
-
230+
- <https://github.com/TheD1rkMtr/NTDLLReflection>
231+
- <https://github.com/reveng007/ReflectiveNtdll>
232+
229233
<https://www.ired.team/offensive-security/code-injection-process-injection/dll-injection>
230234
- DLL Sideloading & Proxying
231235
- <https://book.hacktricks.xyz/windows-hardening/windows-av-bypass#dll-sideloading-and-proxying>

0 commit comments

Comments
 (0)