edparcell / HelloWorldXll
A simple XLL, showing how to create an XLL from scratch.
☆44Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for HelloWorldXll
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆62Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 3 years ago
- code for the Proxy DLL example blog post☆58Updated 3 years ago
- ☆37Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆38Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆51Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆46Updated last year
- The program is designed to dump full memory of the process by specifing process name or process id.☆39Updated 5 years ago
- Running .NET from VBA☆131Updated last year
- A C port of b33f's UrbanBishop☆37Updated 4 years ago
- Managed code hooking template.☆128Updated 3 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆38Updated 4 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆39Updated 5 years ago
- ☆19Updated 3 years ago
- ☆11Updated 3 years ago
- VBA Macro obfuscator☆13Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆39Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- API Hammering with C++20☆34Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆49Updated 3 years ago
- MSBuild Without MSBuild.exe☆155Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆44Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆97Updated last year
- Simple .NET assembly to interact with services.☆38Updated 5 years ago
- ☆54Updated 3 years ago