A .NET assembly tracer using Harmony for runtime method interception.
☆50Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for NetRunner
Users that are interested in NetRunner are comparing it to the libraries listed below
Sorting:
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- ☆18Jun 16, 2025Updated 8 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆57Jan 17, 2026Updated last month
- Arbitrary command execution on Open Folder via .vscode/tasks.json☆33Jan 19, 2026Updated last month
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆93Jul 7, 2025Updated 7 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- ☆35Dec 21, 2023Updated 2 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Visual Studio .suo文件反序列化漏洞利用工具☆17Jun 28, 2025Updated 8 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- A Rust template for writing Beacon Object Files (BOFs)☆101Feb 11, 2026Updated 3 weeks ago
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆211Aug 21, 2025Updated 6 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆47Feb 12, 2026Updated 3 weeks ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆63Jan 5, 2026Updated 2 months ago
- Some V8 n-day exploits that I've written☆50Updated this week
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆23Mar 10, 2025Updated 11 months ago
- command control framework☆32Updated this week
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Sep 5, 2021Updated 4 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 6 months ago
- ☆59Oct 24, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 5 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 3 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆99Aug 5, 2024Updated last year
- A BOF that's a BOF Loader and more☆199Jan 17, 2026Updated last month