TheWover / EasyNet
Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library. Algorithm: Data <-> GZip <-> AES-256 <-> Base64.
☆91Updated 6 years ago
Alternatives and similar repositories for EasyNet
Users that are interested in EasyNet are comparing it to the libraries listed below
Sorting:
- ☆61Updated last year
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆216Updated 5 years ago
- Managed code hooking template.☆131Updated 3 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- .NET tool for enumeration processes and dumping memory.☆56Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- Various C# projects for offensive security☆109Updated 5 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆41Updated 6 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 5 years ago
- .NET assembly local/remote loading/injection into memory.☆133Updated 5 years ago
- dem sharp donuts☆196Updated 2 years ago
- .Net Assembly to block ETW telemetry in current process☆78Updated 4 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- C# code to run shellcode in a sneaky way☆90Updated 4 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- Automate AV evasion by calling AMSI☆88Updated last year
- PoC to demonstrate how CLR ETW events can be tampered.☆188Updated 5 years ago
- SharpShell is a proof-of-concept offensive C# scripting engine that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framew…☆126Updated 6 years ago
- MSBuild Without MSBuild.exe☆156Updated 4 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- WMI Event Subscription Persistence in C#☆113Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Updated 5 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- YouTube/Livestream project for obfuscating C# source code using Roslyn☆126Updated 4 years ago
- medium-rare☆28Updated 5 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Updated 6 years ago
- A pattern for client/server communication via Named Pipes via C#☆97Updated 6 years ago