Inject code into .net applications
☆13Nov 7, 2018Updated 7 years ago
Alternatives and similar repositories for DotNetInjector
Users that are interested in DotNetInjector are comparing it to the libraries listed below
Sorting:
- ☆50May 12, 2021Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- The modifyed cjson that can running on windows kernel☆15Mar 21, 2023Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆20Aug 12, 2020Updated 5 years ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- This Repository is a collection of all of my solved problems on Hacker rank in Python course. This repository contain basic program from…☆16Oct 1, 2020Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- a very simple dns server☆15Jun 4, 2017Updated 8 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- Il repository raccoglie la parte pratica del canale youtube Bitcoin in action☆12Dec 18, 2023Updated 2 years ago
- Windows Kernel nt files - To research windows kernel☆15Jul 23, 2020Updated 5 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- CoreDNS plugin for replacing CNAME records on zone apex☆20May 5, 2024Updated last year
- Linux Remote Process Injection and Hooking Example - htop☆12Apr 30, 2021Updated 4 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- TIBCO Streaming samples, showing various aspects of Streaming functionality.☆11Mar 2, 2026Updated 3 weeks ago
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Guide to installing Arch Linux onto your system, target at newbies and experienced users.☆12Aug 21, 2018Updated 7 years ago
- [DEPRECATED] A simple example service, demonstrating gRPC integration with the Bond framework.☆18Mar 7, 2022Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- Scripts for Pentesting☆13May 29, 2025Updated 9 months ago
- Rust-based linux reverse shell listener.☆12Aug 7, 2024Updated last year
- My personal collection of dotfiles☆12May 26, 2023Updated 2 years ago
- ☆13Jan 15, 2026Updated 2 months ago
- ☆18Jun 11, 2024Updated last year
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- Low latency fix engine for .net☆16Aug 8, 2019Updated 6 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- ☆18Feb 18, 2022Updated 4 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- FIX metadata model☆11Nov 18, 2015Updated 10 years ago