A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.
☆100Mar 25, 2025Updated 11 months ago
Alternatives and similar repositories for CSharpSourceObfuscator
Users that are interested in CSharpSourceObfuscator are comparing it to the libraries listed below
Sorting:
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆162Mar 1, 2024Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆286Jun 18, 2025Updated 9 months ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆164Dec 30, 2022Updated 3 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆262Jun 29, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆436Dec 21, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆374Apr 19, 2023Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆574Jan 20, 2026Updated 2 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Dec 9, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆164Jan 4, 2024Updated 2 years ago
- Library of BOFs to interact with SQL servers☆227Dec 3, 2025Updated 3 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated 2 months ago
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated last year
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated last year
- ☆153Jan 6, 2023Updated 3 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 6 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Some Rust program I wrote while learning Malware Development☆159Feb 4, 2025Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- It's pointy and it hurts!☆127Oct 18, 2022Updated 3 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated 2 years ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆680Aug 15, 2025Updated 7 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆326Apr 12, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago