|
@@ -6,7 +6,7 @@ The following tools are currently in the operators' kit:
|
|
|
|
|
|
|
|
|Name|Decription|
|
|
|Name|Decription|
|
|
|
|----|----------|
|
|
|----|----------|
|
|
|
-|**[BlindEventlog](KIT/BlindEvenlog)**|Blind Eventlog by suspending its threads.|
|
|
|
|
|
|
|
+|**[BlindEventlog](KIT/BlindEventlog)**|Blind Eventlog by suspending its threads.|
|
|
|
|**[FindDotnet](KIT/FindDotnet)**|Find processes that most likely have .NET loaded.|
|
|
|**[FindDotnet](KIT/FindDotnet)**|Find processes that most likely have .NET loaded.|
|
|
|
|**[FindHandle](KIT/FindHandle)**|Find "process" and "thread" handle types between processes.|
|
|
|**[FindHandle](KIT/FindHandle)**|Find "process" and "thread" handle types between processes.|
|
|
|
|**[FindLib](KIT/FindLib)**|Find loaded module(s) in remote process(es).|
|
|
|**[FindLib](KIT/FindLib)**|Find loaded module(s) in remote process(es).|
|
|
@@ -22,4 +22,4 @@ Each individual tool has its own README file with usage and compile information.
|
|
|
## Credits
|
|
## Credits
|
|
|
A round of virtual applause to [reenz0h](https://twitter.com/SEKTOR7net). Lots of tools in this kit are based on his code examples and ideas from the Malware Development and Windows Evasion courses. I highly recommend taking them!
|
|
A round of virtual applause to [reenz0h](https://twitter.com/SEKTOR7net). Lots of tools in this kit are based on his code examples and ideas from the Malware Development and Windows Evasion courses. I highly recommend taking them!
|
|
|
|
|
|
|
|
-Furthermore, some code from the [C2-Tool-Collection](https://github.com/outflanknl/C2-Tool-Collection) project is copied to neatly print beacon output.
|
|
|
|
|
|
|
+Furthermore, some code from the [C2-Tool-Collection](https://github.com/outflanknl/C2-Tool-Collection) project is copied to neatly print beacon output.
|