bartblaze / DotNet-MetaDataLinks
Identifies metadata of .NET binary files.
☆21Updated last year
Alternatives and similar repositories for DotNet-MetaData
Users that are interested in DotNet-MetaData are comparing it to the libraries listed below
Sorting:
- Ghosting-AMSI☆17Updated 2 months ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- ☆18Updated 6 months ago
- ☆39Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- ☆23Updated last year
- ☆25Updated 5 months ago
- Golang bindings for PE-sieve☆42Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆27Updated 7 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Malware Analysis tools☆26Updated 9 months ago
- ☆42Updated last month
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Repo containing my public talks☆23Updated 2 years ago
- A pcap capture analysis helper☆24Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- ☆23Updated last year
- example using NtCreateUserProcess in rust☆19Updated 5 months ago
- ☆25Updated 2 years ago
- ☆26Updated 4 months ago
- ☆37Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- ☆31Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- ☆18Updated last year