bananabr / CLRInjectorLinks
A PoC .NET-specific process injection tool
☆57Updated last year
Alternatives and similar repositories for CLRInjector
Users that are interested in CLRInjector are comparing it to the libraries listed below
Sorting:
- Modified versions of the Cobalt Strike Process Injection Kit☆105Updated last year
- ☆74Updated last year
- ☆131Updated 2 years ago
- Lockless BOF☆79Updated 8 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆58Updated 2 years ago
- BypassCredGuard CS BOF☆48Updated 11 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆75Updated 2 months ago
- ☆100Updated last year
- Bypassing Amsi using LdrLoadDll☆47Updated last year
- Click Once + App Domain☆64Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆124Updated last month
- ☆92Updated last year
- ☆100Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆82Updated 3 years ago
- ☆49Updated 7 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆85Updated 9 months ago
- ☆26Updated last year
- Sliver agent rewritten in C++☆49Updated last year
- ☆129Updated 2 years ago
- ☆122Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54Updated 8 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Updated 6 months ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆72Updated 3 years ago
- Lateral Movement via the .NET Profiler☆98Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆133Updated 3 years ago