bytecode77 / self-morphing-csharp-binaryLinks
Executable that mutates its own code
☆391Updated 7 months ago
Alternatives and similar repositories for self-morphing-csharp-binary
Users that are interested in self-morphing-csharp-binary are comparing it to the libraries listed below
Sorting:
- A set of scripts that demonstrate how to perform memory injection in C#☆318Updated 8 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆239Updated 2 years ago
- A free and open-source .NET obfuscator using dnlib.☆515Updated 2 years ago
- Process Injection☆766Updated 4 years ago
- DNCI - Dot Net Code Injector☆148Updated 5 years ago
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆728Updated 7 months ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Updated 2 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆769Updated 3 years ago
- Managed assembly shellcode generation☆280Updated 4 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆206Updated last year
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Updated 4 years ago
- An Obfuscator for .NET assembly☆246Updated 7 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆401Updated 5 years ago
- Tool to create hidden registry keys.☆490Updated 6 years ago
- Hide malware behind a legit process C#☆129Updated 5 years ago
- Research on Anti-malware and other related security solutions☆265Updated 5 years ago
- Code that allows running another windows PE in the same address space as the host process.☆457Updated 9 years ago
- DotNet Obfuscator/Packer☆103Updated 5 years ago
- C# Based Universal API Unhooker☆411Updated 3 years ago
- Retrieves passwords stored in browsers written in C#☆95Updated last year
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆233Updated 6 years ago
- Fileless attack with persistence☆370Updated 7 months ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Updated 3 years ago
- Collection of C# scripts☆341Updated 8 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆806Updated 5 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆253Updated 4 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆313Updated 7 years ago
- Just another Windows Process Injection☆407Updated 5 years ago
- dem sharp donuts☆202Updated 3 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆348Updated 5 years ago