edparcell / HelloWorldXll
A simple XLL, showing how to create an XLL from scratch.
☆47Updated 9 years ago
Alternatives and similar repositories for HelloWorldXll:
Users that are interested in HelloWorldXll are comparing it to the libraries listed below
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- Running .NET from VBA☆144Updated 2 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆11Updated 4 years ago
- Python script to obfuscate VBA (Virtual Basic for Applications) macros☆55Updated 5 years ago
- code for the Proxy DLL example blog post☆61Updated 3 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Updated 5 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 6 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26Updated 5 years ago
- DInvisibleRegistry☆82Updated 4 years ago
- ☆19Updated 4 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆41Updated 5 years ago
- ☆39Updated 2 years ago
- ☆12Updated 3 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- x64 Registration-Free In-Process COM Automation Server.☆48Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆59Updated 3 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆64Updated 4 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆38Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆27Updated 5 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- Extension of SMBLibrary for RPC calls☆33Updated 10 months ago
- VBA Macro obfuscator☆12Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 5 months ago
- The program is designed to dump full memory of the process by specifing process name or process id.☆39Updated 5 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆58Updated 2 years ago