bartblaze / DotNet-MetaData
Identifies metadata of .NET binary files.
☆21Updated 9 months ago
Alternatives and similar repositories for DotNet-MetaData:
Users that are interested in DotNet-MetaData are comparing it to the libraries listed below
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆13Updated 6 months ago
- ☆22Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- some sploits☆17Updated 3 months ago
- ☆36Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- Golang bindings for PE-sieve☆41Updated last year
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- ☆24Updated last week
- ☆23Updated 8 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 7 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- Docker container for running CobaltStrike 4.10☆35Updated 4 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆34Updated 4 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- ☆45Updated 2 months ago
- ☆18Updated last week
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆35Updated 2 months ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- Malware Analysis tools☆25Updated 4 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 6 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Unix Process hollowing in rust☆20Updated last month
- ☆15Updated last year