Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"
☆31Feb 28, 2019Updated 7 years ago
Alternatives and similar repositories for CsharpMMNiceness
Users that are interested in CsharpMMNiceness are comparing it to the libraries listed below
Sorting:
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- ☆21Jul 6, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- django-sockjs-server☆14Jun 29, 2015Updated 10 years ago
- Scutex is a .Net licensing system built on top of WPF and WCF and .Net 4☆16Aug 8, 2012Updated 13 years ago
- AI-powered reverse engineering assistant for IDA Pro with multiple LLM support (Claude, OpenAI, Gemini).☆22Jan 29, 2026Updated last month
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- initial commit☆44Nov 19, 2024Updated last year
- ☆10Aug 16, 2019Updated 6 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Wireguard over TCP / HTTP using wstunnel for windows and linux☆11Feb 17, 2025Updated last year
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 6 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 4 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- C# library for calling executable files☆10Dec 3, 2018Updated 7 years ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- Modded version of KoiVM☆12Aug 17, 2019Updated 6 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago