diljith369 / CSharp4Pentesters
CSharp4Pentesters
☆12Updated 2 years ago
Alternatives and similar repositories for CSharp4Pentesters:
Users that are interested in CSharp4Pentesters are comparing it to the libraries listed below
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- ☆46Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆22Updated last month
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Offensive Assembly code snippets.☆12Updated last year
- Yet, Another Packer/Loader☆25Updated last year
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- ☆27Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- ☆18Updated last year
- A pure C version of SymProcAddress☆24Updated 10 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- All my POC related to malware development☆11Updated 8 months ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆17Updated 3 years ago
- ☆47Updated last year
- ☆19Updated 2 years ago
- ☆12Updated 2 years ago
- IAT Unhooking proof-of-concept☆29Updated 9 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆35Updated 2 months ago
- ☆18Updated 3 months ago