DamonMohammadbagher / eBook-BypassingAVsByCSharp
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
☆464Updated last year
Alternatives and similar repositories for eBook-BypassingAVsByCSharp:
Users that are interested in eBook-BypassingAVsByCSharp are comparing it to the libraries listed below
- Process Injection☆755Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆792Updated 2 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆920Updated 3 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆474Updated 2 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆518Updated 6 years ago
- Tool to create hidden registry keys.☆476Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆515Updated 3 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆986Updated 3 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆850Updated 3 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,131Updated 3 years ago
- C# Script used for Red Team☆718Updated 3 years ago
- SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.☆663Updated 6 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆539Updated 4 years ago
- Cobalt Strike kit for Lateral Movement☆660Updated 4 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,246Updated 5 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆514Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆515Updated 3 years ago
- Cobalt Strike kit for Persistence☆472Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆344Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆737Updated last year
- ☆352Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆795Updated 5 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆590Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,463Updated last year
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆512Updated 2 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆579Updated 5 years ago
- Shellcode wrapper with encryption for multiple target languages☆436Updated 8 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆977Updated last year