Dump-GUY / Get-PDInvokeImportsLinks
Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke usage in assembly. Showing all locations from where they are referenced and Exports all to DnSpy_Bookmarks.xml
☆54Updated 3 years ago
Alternatives and similar repositories for Get-PDInvokeImports
Users that are interested in Get-PDInvokeImports are comparing it to the libraries listed below
Sorting:
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- ☆82Updated 9 months ago
- ☆18Updated last year
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆41Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆36Updated 3 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- ☆39Updated 4 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆103Updated 2 years ago
- A C# port of the MinHook API hooking library☆55Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Ghosting-AMSI☆17Updated last month
- miscellaneous codes☆35Updated last year
- Self Delete DLL☆23Updated last year
- Enabled / Disable LSA Protection via BYOVD☆68Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- ☆115Updated 2 years ago
- ☆62Updated 3 years ago
- Windows process injection methods☆16Updated 5 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 11 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆17Updated 10 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- ☆39Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago