NetSPI / MonkeyWorks
☆61Updated last year
Alternatives and similar repositories for MonkeyWorks:
Users that are interested in MonkeyWorks are comparing it to the libraries listed below
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆91Updated 5 years ago
- Various C# projects for offensive security☆109Updated 5 years ago
- Managed code hooking template.☆131Updated 3 years ago
- ☆182Updated 3 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆64Updated 5 years ago
- CSHARP DCOM Fun☆128Updated 5 years ago
- A C# tool for enumerating remote access policies through group policy.☆72Updated 6 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Updated 7 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆216Updated 5 years ago
- WMI Event Subscription Persistence in C#☆113Updated 5 years ago
- .NET tool for enumeration processes and dumping memory.☆56Updated 6 years ago
- MSBuild Without MSBuild.exe☆156Updated 4 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆232Updated 2 years ago
- SharpShell is a proof-of-concept offensive C# scripting engine that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framew…☆126Updated 6 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆78Updated 4 years ago
- Abusing Exchange via EWS☆148Updated 4 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Port of Invoke-Excel4DCOM☆105Updated 5 years ago
- D/Invoke port of UrbanBishop☆107Updated 4 years ago
- Automate AV evasion by calling AMSI☆88Updated last year
- Code Exec via Excel☆87Updated 7 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆136Updated 5 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago