dtrizna / DInvoke_PoC
Hardened Proof of Concept of D/Invoke Process Injection malware
☆40Updated 4 years ago
Alternatives and similar repositories for DInvoke_PoC:
Users that are interested in DInvoke_PoC are comparing it to the libraries listed below
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 3 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆49Updated 3 years ago
- Load C# Code straight to memory☆53Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆98Updated 2 years ago
- ☆24Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Updated 5 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- Get or remove RunMRU values☆53Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆69Updated 4 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆113Updated 3 years ago
- ☆55Updated 3 years ago
- ☆66Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- ☆91Updated 3 years ago
- ☆69Updated 3 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆46Updated 4 years ago
- Aggressor Script to Execute Assemblies from Github☆66Updated 4 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆22Updated last year
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆85Updated 3 years ago
- Remove API hooks from a Beacon process.☆55Updated 2 years ago
- DInvisibleRegistry☆81Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆85Updated 3 years ago
- ☆45Updated 4 years ago