HackingThings / SneakyExec
C# code to run shellcode in a sneaky way
☆90Updated 4 years ago
Alternatives and similar repositories for SneakyExec:
Users that are interested in SneakyExec are comparing it to the libraries listed below
- A tool to run .Net DLLs from the command line☆102Updated 6 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆90Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 4 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- Use CLR to inject all the .NET apps☆183Updated 3 years ago
- UAC Bypass with mmc via alpc☆155Updated 5 years ago
- ☆93Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆110Updated 3 years ago
- Various C# projects for offensive security☆108Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆108Updated 4 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- ☆54Updated 6 years ago
- Automate AV evasion by calling AMSI☆86Updated last year
- dem sharp donuts☆188Updated 2 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆94Updated 7 years ago
- External C2 Using IE COM Objects☆98Updated 5 years ago
- WMI Event Subscription Persistence in C#☆112Updated 5 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆224Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆155Updated 5 years ago
- ☆52Updated 5 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆108Updated 6 years ago
- POC for CVE-2018-0824☆86Updated 2 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- few months old but better than nothing☆58Updated 2 years ago
- PoC dlls for Task Scheduler COM Hijacking☆90Updated 8 years ago
- ☆75Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆89Updated 6 years ago