WithSecureLabs / dotnet-gargoyleLinks
A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique
☆52Updated 7 years ago
Alternatives and similar repositories for dotnet-gargoyle
Users that are interested in dotnet-gargoyle are comparing it to the libraries listed below
Sorting:
- AMSI detection PoC☆31Updated 5 years ago
- Tool to manage user privileges☆31Updated 6 years ago
- ☆24Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- Loads .NET Assembly Via CLR Loader☆17Updated 6 years ago
- ☆18Updated 4 years ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- Some stuff for PHD2021☆14Updated 8 months ago
- leaking net-ntlm with webdav☆26Updated 4 years ago
- ☆14Updated 6 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- ☆48Updated 4 years ago
- ☆28Updated 8 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 4 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Updated 6 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41Updated 6 years ago
- ☆16Updated 5 years ago
- ☆45Updated 7 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- LoadLibrary for offensive operations☆33Updated 4 years ago
- POC code to crash Windows Event Logger Service☆27Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- ☆24Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 4 years ago
- all credits go to @mgeeky☆64Updated 4 years ago
- ☆39Updated 4 years ago