Conversation
|
What do you think about this: https://unprotect.it/technique/process-argument-spoofing/ ? The process argument spoofing evasion technique was already documented, so I merged the existing content (which focuses on Windows) with your contribution, which emphasizes Linux. Please let me know if you're okay with this. Note that the details about Linux techniques can be expanded by clicking on the Linux section accordion. When you agree, I will publish accept your pull request. |
|
I think we can close and merge this PR @DarkCoderSc @wietze :) |
|
Thank you @DarkCoderSc for your review.
This is not true for the technique I documented in this PR, as it is done before the process is started. That said, I'm easy - happy either way. If you think this is best, please feel free to go ahead. Many thanks! |
Merci