fozavci / WeaponisingCSharp-Fundamentals
Weaponising C# - Fundamentals Training Content
☆71Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for WeaponisingCSharp-Fundamentals
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆111Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 4 months ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- ☆69Updated 3 years ago
- ☆9Updated 2 weeks ago
- ☆47Updated 4 years ago
- Bypassing AppLocker with C#☆136Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆117Updated 2 years ago
- Koppeling x Metatwin x LazySign☆203Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- Slide decks and/or materials from conference presentations☆54Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆17Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆139Updated 3 years ago
- Simple APPLocker bypass summary☆39Updated 6 years ago
- ☆68Updated last year
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- ☆37Updated 6 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago