arsium / ShellCodeLoaderCSharp
A small shellcode loader library written in C#
☆46Updated 3 years ago
Alternatives and similar repositories for ShellCodeLoaderCSharp:
Users that are interested in ShellCodeLoaderCSharp are comparing it to the libraries listed below
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 5 years ago
- A rework of CMLuaUtil AutoElevated☆24Updated 2 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year
- Bypassing ETW with Csharp☆26Updated 3 years ago
- Extracting Syscall Stub, Modernized☆64Updated 3 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- My personal shellcode loader☆31Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆61Updated 3 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 2 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆164Updated 3 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- A tool implementing process hollowing making your PE polymorphic☆15Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆104Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.☆75Updated last month
- Overwrite a process's recovery callback and execute with WER☆103Updated 3 years ago
- Exploring in-memory execution of .NET☆137Updated 3 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- MappingInjection via csharp☆38Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆54Updated 2 years ago
- UUID based Shellcode loader for your favorite C2☆86Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆107Updated 3 years ago