NtDallas / sharp-execute
Execute dotnet app from unmanaged process
☆73Updated 3 months ago
Alternatives and similar repositories for sharp-execute:
Users that are interested in sharp-execute are comparing it to the libraries listed below
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- ☆98Updated last year
- converts sRDI compatible dlls to shellcode☆23Updated 3 months ago
- ☆55Updated 3 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆40Updated last year
- ☆30Updated last month
- ☆52Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆50Updated last year
- stack spoofing☆84Updated 5 months ago
- ForsHops☆41Updated last month
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆81Updated 6 months ago
- ☆27Updated 3 months ago
- Bypassing Amsi using LdrLoadDll☆44Updated 3 months ago
- ☆97Updated 7 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆47Updated last year
- Rust template/library for implementing your own COFF loader☆50Updated 2 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆48Updated 3 months ago
- BypassCredGuard CS BOF☆38Updated 3 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated last month
- ☆86Updated 8 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Threadless shellcode injection tool☆63Updated 8 months ago
- ☆36Updated 2 years ago
- Sliver agent rewritten in C++☆45Updated 7 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- ☆23Updated 2 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated 10 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆114Updated 3 months ago