jasondrawdy / MemoryMapperLinks
Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a process specified by the user or self-injection.
☆32Updated 5 years ago
Alternatives and similar repositories for MemoryMapper
Users that are interested in MemoryMapper are comparing it to the libraries listed below
Sorting:
- Inject Frida-Gadget into a local process☆26Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Updated 5 years ago
- Use to generate DLL through Visual Studio☆20Updated 7 years ago
- Example of async client/server sockets in .NET 5☆17Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- CVE-2020-5837 exploit☆41Updated 5 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Updated 6 years ago
- ☆15Updated 6 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Hide Mimikatz From Process Lists☆17Updated 10 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Updated 6 years ago
- interesting analysis☆16Updated 7 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆22Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 2 years ago
- C# DCOM Execution☆18Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆15Updated last year
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Installs And Executes Shellcode☆11Updated 9 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- ☆11Updated 6 years ago
- ☆21Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago