BinaryScary / NET-ObfuscateLinks
Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
☆238Updated 2 years ago
Alternatives and similar repositories for NET-Obfuscate
Users that are interested in NET-Obfuscate are comparing it to the libraries listed below
Sorting:
- C# Based Universal API Unhooker☆405Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆436Updated 2 years ago
- Managed assembly shellcode generation☆272Updated 4 years ago
- A collection of weird ways to execute unmanaged code in .NET☆170Updated 4 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 5 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆205Updated 8 months ago
- Inject .NET assemblies into an existing process☆498Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆161Updated 5 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆315Updated 7 years ago
- .NET assembly local/remote loading/injection into memory.☆135Updated 5 years ago
- C# Implementation of the Hell's Gate VX Technique☆215Updated 5 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆583Updated 3 years ago
- dem sharp donuts☆199Updated 2 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆197Updated 8 years ago
- Process Ghosting in C#☆216Updated 3 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆260Updated 3 years ago
- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red …☆349Updated 3 years ago
- Chromium Cookie import / export tool☆304Updated 2 years ago
- Lockless allows for the copying of locked files.☆248Updated 4 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆217Updated 5 years ago
- The program is designed to obfuscate the shellcode.☆205Updated 4 years ago
- Managed code hooking template.☆131Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆189Updated 5 years ago
- ☆72Updated last year
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 2 years ago
- .NET project for installing Persistence☆480Updated last year
- C# tool for UAC bypasses☆439Updated 3 years ago
- ☆185Updated 4 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆165Updated 3 years ago