michaelweber / CSharpSourceObfuscator
A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.
☆72Updated 4 years ago
Alternatives and similar repositories for CSharpSourceObfuscator:
Users that are interested in CSharpSourceObfuscator are comparing it to the libraries listed below
- Halos Gate-based NTAPI Unhooker☆50Updated 2 years ago
- ☆127Updated last year
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆45Updated 9 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆58Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆69Updated 3 weeks ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆69Updated 3 months ago
- Tool for playing with Windows Access Token manipulation.☆53Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago
- ☆115Updated last year
- ☆122Updated 5 months ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆103Updated last year
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- Lateral Movement via the .NET Profiler☆79Updated 2 months ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 3 months ago
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- Threadless shellcode injection tool☆63Updated 6 months ago
- TypeLib persistence technique☆106Updated 3 months ago
- ☆92Updated 3 weeks ago
- Bypassing Amsi using LdrLoadDll☆37Updated last month
- ☆120Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆39Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 9 months ago
- ☆134Updated last year
- ☆93Updated 5 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ☆97Updated last year