Xariman / SimpleSourceProtector
Simple c# source code obfuscator
☆27Updated 6 years ago
Alternatives and similar repositories for SimpleSourceProtector:
Users that are interested in SimpleSourceProtector are comparing it to the libraries listed below
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆20Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆39Updated 5 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- ☆64Updated 2 years ago
- Hide code from dnSpy and other C# spying tools☆40Updated 4 years ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 2 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆8Updated 3 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆53Updated last year
- Quick Proof of Concept for reading a processes memory and searching for a specific string.☆9Updated 6 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆30Updated 3 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Updated 3 years ago
- Bare template for a Kernel Mode Driver☆51Updated 4 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- Process Hollowing demonstration & explanation☆34Updated 3 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆38Updated last year
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- x64 Registration-Free In-Process COM Automation Server.☆48Updated 2 years ago
- ☆15Updated 3 years ago
- ☆12Updated 4 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆45Updated 7 years ago
- Inject Frida-Gadget into a local process☆24Updated 5 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Load PE via XML Attribute☆29Updated 4 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆46Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year