mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-02 10:08:34 +02:00
update
This commit is contained in:
@ -100,8 +100,12 @@ PS> python3 rdpFileUpload.py -v -f certutil README.md
|
||||
|
||||
- **`revshell.c`** - Utterly simple reverse-shell, ready to be compiled by `mingw-w64` on Kali. No security features attached, completely not OPSEC-safe.
|
||||
|
||||
- [**`ShellcodeFluctuation`**](https://github.com/mgeeky/ShellcodeFluctuation) - An in-memory evasion technique fluctuating shellcode memory protection between RW & RX and encrypting/decrypting contents.
|
||||
|
||||
- **`Simulate-DNSTunnel.ps1`** - Performs DNS Tunnelling simulation for purpose of triggering installed Network IPS and IDS systems, generating SIEM offenses and picking up Blue Teams.
|
||||
|
||||
- [**`ThreadStackSpoofer`**](https://github.com/mgeeky/ThreadStackSpoofer) - A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory.
|
||||
|
||||
- **`UnhookMe`** - Dynamically unhooking imports resolver. Implementation of dynamic imports resolver that would be capable of unhooking used functions in-the-fly is yet another step towards strengthening adversary resilience efforts.
|
||||
|
||||
```
|
||||
|
1
windows/ShellcodeFluctuation
Submodule
1
windows/ShellcodeFluctuation
Submodule
Submodule windows/ShellcodeFluctuation added at 21a7194ca7
1
windows/ThreadStackSpoofer
Submodule
1
windows/ThreadStackSpoofer
Submodule
Submodule windows/ThreadStackSpoofer added at 37490f57f5
Reference in New Issue
Block a user