Acew0rm / Dll-Export-Report-Convert
This takes a full function .html report from Dll Export Viewer and converts it into #pragma statements used for dll hijacking proxy dlls.
☆9Updated 6 years ago
Alternatives and similar repositories for Dll-Export-Report-Convert:
Users that are interested in Dll-Export-Report-Convert are comparing it to the libraries listed below
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- Simple DLL injector written in C#☆24Updated 9 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago
- Hide code from dnSpy and other C# spying tools☆41Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- XOR crypt/decrypt using C#☆12Updated 4 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 4 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- ☆35Updated 5 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 2 years ago
- ☆16Updated 3 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆82Updated 5 years ago
- Simple c# source code obfuscator☆27Updated 7 years ago
- ☆63Updated 2 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆41Updated 5 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 4 months ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago