bartblaze / DotNet-MetaDataLinks
Identifies metadata of .NET binary files.
☆21Updated last year
Alternatives and similar repositories for DotNet-MetaData
Users that are interested in DotNet-MetaData are comparing it to the libraries listed below
Sorting:
- ☆18Updated 6 months ago
- Ghosting-AMSI☆17Updated 3 months ago
- ☆27Updated 8 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆37Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- ☆48Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- ☆17Updated last year
- Repo containing my public talks☆23Updated 2 years ago
- ☆16Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- Help deobfuscate VBScript☆15Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆13Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- Proof-of-concept modular implant platform leveraging v8☆53Updated 4 months ago
- ☆32Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆74Updated 2 years ago
- ☆18Updated last year
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago