edparcell / HelloWorldXll
A simple XLL, showing how to create an XLL from scratch.
☆47Updated 9 years ago
Alternatives and similar repositories for HelloWorldXll:
Users that are interested in HelloWorldXll are comparing it to the libraries listed below
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆91Updated 5 years ago
- ☆38Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆11Updated 3 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- Running .NET from VBA☆143Updated 2 years ago
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆31Updated 5 years ago
- code for the Proxy DLL example blog post☆60Updated 3 years ago
- Managed code hooking template.☆130Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆41Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- My doodles as I learn C#☆76Updated 4 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆38Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆48Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- ☆19Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆52Updated 3 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆89Updated 6 months ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- .Net Assembly to block ETW telemetry in current process☆77Updated 4 years ago
- Python script to obfuscate VBA (Virtual Basic for Applications) macros☆54Updated 5 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Updated 3 years ago
- ☆12Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 4 months ago
- subTee gists code backups☆37Updated 7 years ago
- DInvisibleRegistry☆82Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- ☆34Updated 6 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated last year