bartblaze / DotNet-MetaDataLinks
Identifies metadata of .NET binary files.
☆21Updated last year
Alternatives and similar repositories for DotNet-MetaData
Users that are interested in DotNet-MetaData are comparing it to the libraries listed below
Sorting:
- Golang bindings for PE-sieve☆42Updated 2 years ago
- ☆18Updated 10 months ago
- ☆27Updated 11 months ago
- ☆17Updated 6 months ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆37Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆24Updated 9 months ago
- Ghosting-AMSI☆18Updated 6 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Unpacker for donut shellcode☆17Updated 5 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- A pcap capture analysis helper☆25Updated 2 years ago
- ☆18Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆30Updated 2 months ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆33Updated 3 weeks ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- Collection of my own detection rules☆20Updated 4 months ago
- ☆34Updated last year
- ☆12Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago