Bläddra i källkod

Update README.md

assume-breach 3 år sedan
förälder
incheckning
626c775bd5
1 ändrade filer med 3 tillägg och 2 borttagningar
  1. 3 2
      Harriet/README.md

+ 3 - 2
Harriet/README.md

@@ -1,8 +1,9 @@
-![Screen Shot 2022-10-02 at 10 29 43 AM](https://user-images.githubusercontent.com/76174163/193459549-fc27c099-2b9e-4fa8-9a19-e42e176a2c8d.png)
+![Screen Shot 2022-10-02 at 10 29 43 AM]()
 
 <p align="center">
-  <img src="[http://some_place.com/image.png](https://user-images.githubusercontent.com/76174163/193459549-fc27c099-2b9e-4fa8-9a19-e42e176a2c8d.png)" />
+  <img src="[https://user-images.githubusercontent.com/76174163/193459549-fc27c099-2b9e-4fa8-9a19-e42e176a2c8d.png]" />
 </p>
+
 Meet Harriet!
 
 Harriet was inspired by the Charlotte C++ shellcode loader. This tool uses AES encryption and function/variable obfuscation to get around AV and Windows Defender. At the time of writing, this is only detected by 1 vendor per AntiScan.me and will give you an undetected Meterpreter reverse shell. As we all know, Meterpreter is heavily signatured so you will have to play with the features (getsystem, hashdump,ect) to see what gets caught and what doesn't.