KINGSABRI / DotNetToJScriptMiniLinks
A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.
☆47Updated 4 years ago
Alternatives and similar repositories for DotNetToJScriptMini
Users that are interested in DotNetToJScriptMini are comparing it to the libraries listed below
Sorting:
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆83Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- A BOF to interact with COM objects associated with the Windows software firewall.☆103Updated 3 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Implementation of SpoolSample without rDLL☆28Updated 4 years ago
- Extension of SMBLibrary for RPC calls☆35Updated last year
- ☆38Updated 4 years ago
- C# project to create or modify existing LNKs☆55Updated 2 years ago
- ☆70Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- DInvisibleRegistry☆82Updated 4 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆58Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Updated 3 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆85Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆36Updated 3 years ago
- C# .NET Assembly for interacting with File Object DACLs☆43Updated 5 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- LoadLibrary for offensive operations☆33Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- RDPThief donut shellcode inject into mstsc☆87Updated 4 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆98Updated 3 years ago
- ☆26Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Updated 4 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆79Updated 5 years ago