This project describes a technique how a NATIVE dynamic link library (DLL) can be loaded from memory (In C#) without storing it on the hard-disk first.
☆74Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for DynamicDllLoader
Users that are interested in DynamicDllLoader are comparing it to the libraries listed below
Sorting:
- MSBuild ConfuserEx Target☆11Jul 21, 2025Updated 7 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- C# library to load a native DLL from memory without the need to allow unsafe code☆96Aug 5, 2019Updated 6 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- ☆33Aug 10, 2019Updated 6 years ago
- Overwrites the whole PE Header☆20Apr 20, 2020Updated 5 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Feb 22, 2019Updated 7 years ago
- ☆23May 28, 2021Updated 4 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆108Jan 3, 2021Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- PInvoke at runtime for .NET☆17Sep 13, 2018Updated 7 years ago
- A platform independent C++ code obfuscator.☆13Jul 20, 2019Updated 6 years ago
- Example managed and unmanaged plugins for CoreHook☆14Mar 3, 2019Updated 6 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Simple Process Hollowing in C#☆68Oct 23, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Making the .NET runtime do stuff it's not even supposed to do!☆14Mar 25, 2016Updated 9 years ago
- Integrate MSBuild into PowerShell pipeline.☆25Jun 6, 2018Updated 7 years ago
- Extracting Syscall Stub, Modernized☆65Apr 2, 2022Updated 3 years ago
- Process Ghosting in C#☆219Jan 24, 2022Updated 4 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- Framework for C# development☆70Feb 14, 2026Updated last week
- Loading a native DLL in the memory.☆70Mar 15, 2018Updated 7 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- .NET Resource Reflector☆19Mar 25, 2025Updated 11 months ago