Dewera / Pluto
A manual system call library that supports functions from both ntdll.dll and win32u.dll
☆109Updated last year
Alternatives and similar repositories for Pluto:
Users that are interested in Pluto are comparing it to the libraries listed below
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆47Updated 2 years ago
- A C# port of the MinHook API hooking library☆210Updated 3 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆190Updated 8 years ago
- .NET assembly local/remote loading/injection into memory.☆131Updated 5 years ago
- Packer compressing .net assemblies, (ab)using the PE format for data storage☆173Updated 2 years ago
- A lightweight .NET assembly dependency merger that uses dnLib and 7zip's LZMA SDK for compressing dependant assemblies.☆99Updated 6 months ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- This project describes a technique how a NATIVE dynamic link library (DLL) can be loaded from memory (In C#) without storing it on the ha…☆73Updated 5 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- Easy XOR string encryption for NET based binaries☆137Updated last year
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 2 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆232Updated last year
- Transforms a .NET binary into a chain of meaningless-looking await expressions.☆69Updated 3 months ago
- A collection of weird ways to execute unmanaged code in .NET☆162Updated 3 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆82Updated 5 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆102Updated 2 years ago
- C# library to load a native DLL from memory without the need to allow unsafe code☆92Updated 5 years ago
- Loading a native DLL in the memory.☆70Updated 7 years ago
- Example JIT Hook for .NET FW/Core.☆52Updated 5 years ago
- Bringing kernel driver to C# with NativeAOT (Surpassed by https://github.com/ZeroLP/WDK.NET)☆45Updated 2 years ago
- A C# DLL injection library☆212Updated 3 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- DNCI - Dot Net Code Injector☆147Updated 4 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆187Updated 5 years ago
- JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.☆52Updated 4 years ago
- Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI☆79Updated 3 years ago
- C# Utilities for Windows Notification Facility☆132Updated 4 months ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆213Updated 2 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago