edparcell / HelloWorldXllLinks
A simple XLL, showing how to create an XLL from scratch.
☆48Updated 9 years ago
Alternatives and similar repositories for HelloWorldXll
Users that are interested in HelloWorldXll are comparing it to the libraries listed below
Sorting:
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- code for the Proxy DLL example blog post☆61Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆48Updated 2 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆93Updated 6 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆137Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 7 months ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- ☆34Updated 6 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Updated 3 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- ☆19Updated 4 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- Running .NET from VBA☆146Updated 2 years ago
- ☆41Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Managed code hooking template.☆131Updated 3 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- Small visualizator for PE files☆69Updated last year
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- DInvisibleRegistry☆82Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- ☆39Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆103Updated 2 years ago