gquere / DotNetInjectorLinks
Inject code into .net applications
☆12Updated 7 years ago
Alternatives and similar repositories for DotNetInjector
Users that are interested in DotNetInjector are comparing it to the libraries listed below
Sorting:
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Updated 5 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Updated 4 years ago
- Capture screenshots from .NET using .NET methods or Windows API calls☆67Updated 5 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Updated 6 years ago
- Obtain and parse SSL certificates☆87Updated 4 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 7 years ago
- Curated list of well-developed C# Offensive Tools☆20Updated 5 years ago
- Automate AV evasion by calling AMSI☆87Updated 2 years ago
- .Net Assembly to block ETW telemetry in current process☆81Updated 5 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Updated 5 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- .NET project for writing files to local or remote hosts☆41Updated 5 years ago
- named pipe server with impersonation☆60Updated 6 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Updated 3 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆18Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- c# reverse shell poc☆27Updated 7 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- Small POC for process ghosting☆40Updated 3 years ago
- Bypass Windows defender syscall☆19Updated 4 years ago