HackingThings / SneakyExecLinks
C# code to run shellcode in a sneaky way
☆93Updated 5 years ago
Alternatives and similar repositories for SneakyExec
Users that are interested in SneakyExec are comparing it to the libraries listed below
Sorting:
- A tool to run .Net DLLs from the command line☆104Updated 7 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 4 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆93Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- few months old but better than nothing☆58Updated 3 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- Automate AV evasion by calling AMSI☆87Updated 2 years ago
- PoC dlls for Task Scheduler COM Hijacking☆93Updated 9 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Updated 7 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Use CLR to inject all the .NET apps☆183Updated 4 years ago
- ☆94Updated 7 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- A C# implementation of the PowerShell Empire Agent☆74Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 8 months ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- ☆54Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 8 years ago
- UAC Bypass with mmc via alpc☆157Updated 6 years ago
- Various C# projects for offensive security☆111Updated 6 years ago
- ☆95Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 7 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Updated 6 years ago
- ☆45Updated 7 years ago
- ☆53Updated 7 years ago