Dump-GUY / Get-PDInvokeImports
Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke usage in assembly. Showing all locations from where they are referenced and Exports all to DnSpy_Bookmarks.xml
☆54Updated 3 years ago
Alternatives and similar repositories for Get-PDInvokeImports:
Users that are interested in Get-PDInvokeImports are comparing it to the libraries listed below
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆40Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 10 months ago
- Self Delete DLL☆23Updated last year
- A Poc on blocking Procmon from monitoring network events☆101Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆36Updated 3 years ago
- quASAR: ASAR manipulation made easy☆37Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- ☆24Updated 3 months ago
- A simple PE loader.☆26Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- ☆115Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- ☆62Updated 3 years ago
- ☆82Updated 8 months ago
- Repo containing my public talks☆23Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆54Updated 3 years ago
- A C# port of the MinHook API hooking library☆52Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆51Updated this week
- API Hammering with C++20☆46Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 2 months ago