File tree Expand file tree Collapse file tree 1 file changed +5
-1
lines changed
Expand file tree Collapse file tree 1 file changed +5
-1
lines changed Original file line number Diff line number Diff line change @@ -209,6 +209,8 @@ markmap:
209209
210210- <https://www.ired.team/offensive-security/code-injection-process-injection/process-hollowing-and-pe-image-relocations#relocation>
211211- <https://sevrosecurity.com/2020/04/08/process-injection-part-1-createremotethread/>
212+ - <https://0xsp.com/security%20research%20%20development%20srd/defeat-the-castle-bypass-av-advanced-xdr-solutions/>
213+ - <https://github.com/0xsp-SRD/mortar>
212214
213215### Thread execution hijacking
214216
@@ -225,7 +227,9 @@ markmap:
225227- Reflective dll injection
226228 - <https://disman.tl/2015/01/30/an-improved-reflective-dll-injection-technique.html>
227229- <https://github.com/fancycode/MemoryModule>
228- -
230+ - <https://github.com/TheD1rkMtr/NTDLLReflection>
231+ - <https://github.com/reveng007/ReflectiveNtdll>
232+
229233<https://www.ired.team/offensive-security/code-injection-process-injection/dll-injection>
230234- DLL Sideloading & Proxying
231235 - <https://book.hacktricks.xyz/windows-hardening/windows-av-bypass#dll-sideloading-and-proxying>
You can’t perform that action at this time.
0 commit comments