A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.
☆104Mar 25, 2025Updated last year
Alternatives and similar repositories for CSharpSourceObfuscator
Users that are interested in CSharpSourceObfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An App Domain Manager Injection DLL PoC on steroids☆213Dec 14, 2023Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆163Mar 1, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- Load a dynamic library from memory by modifying the native Windows loader☆301May 5, 2026Updated 2 weeks ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- ☆164Dec 30, 2022Updated 3 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆69Aug 25, 2022Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Jun 18, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆380Apr 19, 2023Updated 3 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆267Jun 29, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆356Nov 19, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆602Jan 20, 2026Updated 3 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated 2 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆311Dec 9, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 10 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 8 months ago
- A PoC .NET-specific process injection tool☆58Mar 17, 2024Updated 2 years ago
- Fileless atexec, no more need for port 445☆407Mar 28, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Library of BOFs to interact with SQL servers☆237Dec 3, 2025Updated 5 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆130Jan 17, 2026Updated 4 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆169Jan 4, 2024Updated 2 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆159Nov 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- It's pointy and it hurts!☆126Oct 18, 2022Updated 3 years ago
- Reaping treasures from strings in remote processes memory☆287Feb 8, 2025Updated last year
- ☆159Dec 13, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆107Feb 25, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆692Aug 15, 2025Updated 9 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆327Apr 12, 2024Updated 2 years ago