Pārlūkot izejas kodu

Create README.md

assume-breach 3 gadi atpakaļ
vecāks
revīzija
b4f10dd6e4
1 mainītis faili ar 10 papildinājumiem un 0 dzēšanām
  1. 10 0
      Harriet/README.md

+ 10 - 0
Harriet/README.md

@@ -0,0 +1,10 @@
+![Screen Shot 2022-10-02 at 10 29 43 AM](https://user-images.githubusercontent.com/76174163/193459549-fc27c099-2b9e-4fa8-9a19-e42e176a2c8d.png)
+
+<p align="center">
+  <img src="[http://some_place.com/image.png](https://user-images.githubusercontent.com/76174163/193459549-fc27c099-2b9e-4fa8-9a19-e42e176a2c8d.png)" />
+</p>
+Meet Harriet!
+
+Harriet was inspired by the Charlotte C++ shellcode loader. This tool uses AES encryption and function/variable obfuscation to get around AV and Windows Defender. At the time of writing, this is only detected by 1 vendor per AntiScan.me and will give you an undetected Meterpreter reverse shell. As we all know, Meterpreter is heavily signatured so you will have to play with the features (getsystem, hashdump,ect) to see what gets caught and what doesn't. 
+
+<img width="779" alt="Screen Shot 2022-10-01 at 4 52 22 PM" src="https://user-images.githubusercontent.com/76174163/193458862-256141c2-7696-40aa-a272-c7db0635c453.png">