diljith369 / CSharp4PentestersLinks
CSharp4Pentesters
☆12Updated 3 years ago
Alternatives and similar repositories for CSharp4Pentesters
Users that are interested in CSharp4Pentesters are comparing it to the libraries listed below
Sorting:
- ☆60Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- IAT Unhooking proof-of-concept☆30Updated last year
- ☆37Updated 5 months ago
- ☆33Updated 2 years ago
- ☆121Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 3 years ago
- ☆47Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Bypass Malware Time Delays☆104Updated 3 years ago
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Lifetime AMSI bypass.☆35Updated 5 months ago
- Situational Awareness script to identify how and where to run implants☆65Updated 9 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- EvtPsst☆55Updated last year
- ☆30Updated last month
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆87Updated 8 months ago
- A repository with my code snippets for research/education purposes.☆51Updated 2 years ago
- maldev obviously☆27Updated 4 months ago
- ☆84Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- ☆59Updated 5 months ago
- A pure C version of SymProcAddress☆29Updated last year
- ☆17Updated last year