Executable that mutates its own code
☆393Jun 28, 2025Updated 8 months ago
Alternatives and similar repositories for self-morphing-csharp-binary
Users that are interested in self-morphing-csharp-binary are comparing it to the libraries listed below
Sorting:
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆736Jun 28, 2025Updated 8 months ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Framework for C# development☆70Mar 10, 2026Updated last week
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 8 months ago
- Process Injection☆768Oct 24, 2021Updated 4 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆240Jun 9, 2023Updated 2 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- A free and open-source .NET obfuscator using dnlib.☆514Aug 23, 2023Updated 2 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆596Jul 26, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Tool to create hidden registry keys.☆490Oct 23, 2019Updated 6 years ago
- SharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching termsrv.dll file.☆314Sep 30, 2019Updated 6 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- C# Based Universal API Unhooker☆409Feb 18, 2022Updated 4 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,587Dec 31, 2025Updated 2 months ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆129May 8, 2021Updated 4 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- .NET project for installing Persistence☆497Jun 26, 2024Updated last year
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- .net obfuscator using dnlib☆415Feb 4, 2025Updated last year
- C# Script used for Red Team☆723Nov 16, 2021Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆1,469Feb 6, 2023Updated 3 years ago
- Collection of C# scripts☆341Feb 8, 2017Updated 9 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆813Dec 17, 2019Updated 6 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago