Process reimaging proof of concept code
☆97Jun 21, 2019Updated 6 years ago
Alternatives and similar repositories for ProcessReimaging
Users that are interested in ProcessReimaging are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- ☆825Dec 28, 2019Updated 6 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Jun 10, 2019Updated 6 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆54Apr 27, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- This is a collection of interesting codes about Windows Process creation.☆237Jan 12, 2024Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Stealthy backdoor for Windows operating systems☆284Feb 13, 2020Updated 6 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago