Files
atomic-red-team/Windows/Credential_Access/Hooking.md
T
2018-04-24 10:17:42 -04:00

352 B
Executable File

Hooking

MITRE ATT&CK Technique: T1179

Sample Windows DLL Injection into PowerShell

 mavinject $pid /INJECTRUNNING C:\Atomic\AtomicSSLHook.dll

Test Script

AtomicSSLHook.dll