malcomvetter / ManagedInjectionLinks
A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge
☆163Updated 7 years ago
Alternatives and similar repositories for ManagedInjection
Users that are interested in ManagedInjection are comparing it to the libraries listed below
Sorting:
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆234Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆287Updated 6 years ago
- ☆219Updated 7 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆151Updated 6 years ago
- ☆61Updated last year
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆147Updated 5 years ago
- ☆229Updated 7 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆93Updated 6 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆307Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆160Updated 8 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆371Updated last year
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆292Updated 5 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆138Updated 8 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆99Updated 7 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆103Updated 8 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆261Updated 6 years ago
- Persisting in the Windows registry "invisibly"☆341Updated 7 years ago
- The full story of the CLR implementation of Meterpreter☆151Updated 5 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆158Updated 6 years ago
- SharpShell is a proof-of-concept offensive C# scripting engine that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framew…☆127Updated 6 years ago
- A pattern for client/server communication via Named Pipes via C#☆98Updated 7 years ago
- Sample use cases of the .NET native code hooking technique☆213Updated 7 years ago
- ☆183Updated 3 years ago
- Various C# projects for offensive security☆111Updated 5 years ago
- Ruxcon2016 POC Code☆140Updated 8 years ago
- UAC Bypass with mmc via alpc☆157Updated 6 years ago