Unknown6656 / rundll.netLinks
The .NET equivalent of Window's rundll.exe/rundll32.exe
☆11Updated 5 years ago
Alternatives and similar repositories for rundll.net
Users that are interested in rundll.net are comparing it to the libraries listed below
Sorting:
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Updated 7 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Updated 6 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 7 years ago
- A pattern for client/server communication via Named Pipes via C#☆98Updated 7 years ago
- SharpShell is a proof-of-concept offensive C# scripting engine that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framew…☆128Updated 7 years ago
- Arya is a simple obfuscator for .NET binaries.☆38Updated 8 years ago
- C# code to run shellcode in a sneaky way☆93Updated 5 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Simple DLL injector written in C#☆24Updated 10 years ago
- ☆60Updated 2 years ago
- POC code to crash Windows Event Logger Service☆27Updated 5 years ago
- C# AV bypass jank☆33Updated 5 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆73Updated 5 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 7 years ago
- ☆42Updated 6 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- Persistent through COM Hijacking☆22Updated 7 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Updated 8 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 7 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 6 years ago
- ☆33Updated 6 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago