NetSPI / MonkeyWorksLinks
☆61Updated last year
Alternatives and similar repositories for MonkeyWorks
Users that are interested in MonkeyWorks are comparing it to the libraries listed below
Sorting:
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆93Updated 6 years ago
- Various C# projects for offensive security☆110Updated 5 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆105Updated 7 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- SharpShell is a proof-of-concept offensive C# scripting engine that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framew…☆127Updated 6 years ago
- .NET tool for enumeration processes and dumping memory.☆57Updated 6 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Updated 4 years ago
- ☆183Updated 3 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Updated 6 years ago
- A pattern for client/server communication via Named Pipes via C#☆98Updated 6 years ago
- A C# DLL to Dump LSA Secrets☆58Updated 7 years ago
- ☆21Updated 7 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231Updated 6 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Updated 5 years ago
- few months old but better than nothing☆58Updated 3 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆217Updated 5 years ago
- Managed code hooking template.☆131Updated 3 years ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆163Updated 6 years ago
- WMI Event Subscription Persistence in C#☆113Updated 6 years ago
- ☆41Updated 5 years ago
- DLL Generator for side loading attack☆173Updated 6 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆99Updated 7 years ago