mirror of
https://github.com/pumpbin/pumpbin
synced 2026-03-14 23:04:30 -07:00
docs: update images
This commit is contained in:
@@ -7,7 +7,7 @@
|
|||||||
**PumpBin** is an Implant Generation Platform.
|
**PumpBin** is an Implant Generation Platform.
|
||||||
|
|
||||||
To use PumpBin, you need to have a b1n file or create one. A b1n file contains one or more binary implant templates, along with some additional descriptive information. We refer to a b1n file as a Plugin.
|
To use PumpBin, you need to have a b1n file or create one. A b1n file contains one or more binary implant templates, along with some additional descriptive information. We refer to a b1n file as a Plugin.
|
||||||

|

|
||||||
|
|
||||||
## ✨ Features
|
## ✨ Features
|
||||||
|
|
||||||
@@ -24,7 +24,6 @@ To use PumpBin, you need to have a b1n file or create one. A b1n file contains o
|
|||||||
|
|
||||||
## ❔ Why
|
## ❔ Why
|
||||||
|
|
||||||
|
|
||||||
Modern cybersecurity teams are divided into offensive personnel and cybersecurity researchers, with researchers responsible for producing digital weapons. The teams typically deploy post-exploitation tools like Cobalt Strike, BRC4, or similar.
|
Modern cybersecurity teams are divided into offensive personnel and cybersecurity researchers, with researchers responsible for producing digital weapons. The teams typically deploy post-exploitation tools like Cobalt Strike, BRC4, or similar.
|
||||||
To evade security software, researchers usually write shellcode loaders, including evasion code to create the final implant. This process generally follows two methods.
|
To evade security software, researchers usually write shellcode loaders, including evasion code to create the final implant. This process generally follows two methods.
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user