Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.
☆37Jan 23, 2020Updated 6 years ago
Alternatives and similar repositories for DotNetInject
Users that are interested in DotNetInject are comparing it to the libraries listed below
Sorting:
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆76Mar 13, 2025Updated 11 months ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Managed code hooking template.☆134Nov 19, 2021Updated 4 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆59Nov 21, 2024Updated last year
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- ☆360Apr 24, 2021Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆195Jul 9, 2021Updated 4 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Apr 17, 2020Updated 5 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 2 years ago
- ☆17Jan 12, 2026Updated last month
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- ☆29May 10, 2024Updated last year
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 weeks ago
- This code was used for the blogpost on secjuice.☆42Apr 17, 2019Updated 6 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Aug 10, 2021Updated 4 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- Small project to facilitate creation of .lnk payloads☆80Nov 18, 2022Updated 3 years ago
- .NET assembly local/remote loading/injection into memory.☆136Aug 2, 2019Updated 6 years ago
- C Sharp codes of my blog.☆188May 30, 2022Updated 3 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year