Generate docs from job=validate_atomics_generate_docs branch=master

This commit is contained in:
CircleCI Atomic Red Team doc generator
2020-04-10 01:28:35 +00:00
parent 8158b7a2d0
commit ec7920d2e6
2 changed files with 6 additions and 6 deletions
+4 -4
View File
@@ -10852,7 +10852,7 @@ defense-evasion:
default: explorer
dll_path:
description: Path of the dll to inject
type: string
type: path
default: PathToAtomicsFolder\T1502\bin\calc.dll
dll_process_name:
description: Name of the created process from the injected dll
@@ -10860,7 +10860,7 @@ defense-evasion:
default: calculator
spawnto_process_path:
description: Path of the process to spawn
type: string
type: path
default: C:\Program Files\Internet Explorer\iexplore.exe
spawnto_process_name:
description: Name of the process to spawn
@@ -14780,7 +14780,7 @@ privilege-escalation:
default: explorer
dll_path:
description: Path of the dll to inject
type: string
type: path
default: PathToAtomicsFolder\T1502\bin\calc.dll
dll_process_name:
description: Name of the created process from the injected dll
@@ -14788,7 +14788,7 @@ privilege-escalation:
default: calculator
spawnto_process_path:
description: Path of the process to spawn
type: string
type: path
default: C:\Program Files\Internet Explorer\iexplore.exe
spawnto_process_name:
description: Name of the process to spawn
+2 -2
View File
@@ -29,9 +29,9 @@ Credit to In Ming Loh (https://github.com/countercept/ppid-spoofing/blob/master/
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| parent_process_name | Name of the parent process | string | explorer|
| dll_path | Path of the dll to inject | string | PathToAtomicsFolder\T1502\bin\calc.dll|
| dll_path | Path of the dll to inject | path | PathToAtomicsFolder\T1502\bin\calc.dll|
| dll_process_name | Name of the created process from the injected dll | string | calculator|
| spawnto_process_path | Path of the process to spawn | string | C:\Program Files\Internet Explorer\iexplore.exe|
| spawnto_process_path | Path of the process to spawn | path | C:\Program Files\Internet Explorer\iexplore.exe|
| spawnto_process_name | Name of the process to spawn | string | iexplore|