DamonMohammadbagher / NativePayload_TinjectionLinks
Remote Thread Injection by C# + Delegate Techniques
☆12Updated 2 years ago
Alternatives and similar repositories for NativePayload_Tinjection
Users that are interested in NativePayload_Tinjection are comparing it to the libraries listed below
Sorting:
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- ☆14Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Red Team C2 and Post Exploitation code☆34Updated 5 months ago
- PoC code from blog☆16Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13Updated 2 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 6 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 5 years ago
- Nice try reading NTDLL from disk, nerd.☆19Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- ☆22Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Just another casual shellcode native loader☆25Updated 3 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago