Offensive-Panda / .NET_PROFILER_DLL_LOADING
.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypass UAC and getting admin privileges.
☆42Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for .NET_PROFILER_DLL_LOADING
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- ☆35Updated 2 weeks ago
- DFSCoerce exe revisited version with custom authentication☆35Updated 9 months ago
- ☆46Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 5 months ago
- in-process powershell runner for BRC4☆37Updated last year
- BOF for C2 framework☆40Updated this week
- ☆27Updated 5 months ago
- A pure C version of SymProcAddress☆23Updated 7 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- Proof of Concept Exploit for CVE-2024-9465☆23Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 3 months ago
- ☆47Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆21Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- Rewrite to fit my needs☆25Updated 3 months ago
- A simple rpc2socks alternative in pure Go.☆23Updated 4 months ago
- ☆18Updated last month
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆70Updated 3 weeks ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆15Updated 6 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆12Updated last week
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 11 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- All my POC related to malware development☆11Updated 5 months ago