jasondrawdy / MemoryMapper
Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a process specified by the user or self-injection.
☆32Updated 4 years ago
Alternatives and similar repositories for MemoryMapper:
Users that are interested in MemoryMapper are comparing it to the libraries listed below
- Example of async client/server sockets in .NET 5☆16Updated 3 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Inject Frida-Gadget into a local process☆24Updated 5 years ago
- Use to generate DLL through Visual Studio☆18Updated 7 years ago
- interesting analysis☆16Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- ☆10Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- AppContainerBypass☆21Updated 3 years ago
- ☆15Updated last year
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆12Updated last year
- A collection of weaponized LPE exploits written in Go☆52Updated 3 weeks ago
- ☆21Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- An AV evasion PoC tool☆9Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Updated 4 years ago
- Hide .Net assembly into png images☆35Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- ☆10Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- POC for CVE-2021-1699☆16Updated 3 years ago
- A tool/library to proxify DLL☆38Updated 2 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 2 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆22Updated 4 years ago