A C# DLL injection library
☆220May 31, 2021Updated 4 years ago
Alternatives and similar repositories for ManagedInjector
Users that are interested in ManagedInjector are comparing it to the libraries listed below
Sorting:
- C# DLL Injection Library capable of injecting x86 DLLs to x86 process from x64 processes.☆171Feb 21, 2024Updated 2 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.☆321Jul 1, 2021Updated 4 years ago
- A free and open-source .NET obfuscator using dnlib.☆514Aug 23, 2023Updated 2 years ago
- C++ WinRM API via Reflective DLL☆145Sep 11, 2021Updated 4 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- C# Anti-Debug and Anti-Dumping techniques using Win32 API functions and tricks.☆295Dec 6, 2021Updated 4 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- .NET runtime inspector☆273Jan 29, 2019Updated 7 years ago
- C# Based Universal API Unhooker☆411Feb 18, 2022Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆269Mar 18, 2021Updated 4 years ago
- Packer compressing .net assemblies, (ab)using the PE format for data storage☆177Jan 14, 2023Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- A C# port of the MinHook API hooking library☆229Oct 21, 2025Updated 4 months ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- ☆121Jun 17, 2022Updated 3 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆173May 5, 2021Updated 4 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆208Oct 23, 2024Updated last year
- A DLL injector to inject .NET assemblies into a foreign .NET process.☆143Nov 30, 2024Updated last year
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 5 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- ☆60Dec 20, 2023Updated 2 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆334Oct 9, 2021Updated 4 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 5 years ago
- Source for tasks I have used with Covenant☆121Mar 21, 2021Updated 4 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆611Feb 16, 2023Updated 3 years ago
- DInvisibleRegistry☆83Nov 20, 2020Updated 5 years ago
- Collection of extracted Microsoft Defender data for security research purposes☆232Jun 23, 2022Updated 3 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago