perturbed-platypus / UEFIReadCSharpLinks
☆33Updated 5 years ago
Alternatives and similar repositories for UEFIReadCSharp
Users that are interested in UEFIReadCSharp are comparing it to the libraries listed below
Sorting:
- ☆41Updated 5 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆32Updated 7 years ago
- ☆45Updated 7 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- ☆26Updated 6 years ago
- Run Managed Assemblies with RunDll☆17Updated 7 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- Antivirus Emulator Fingerprints☆29Updated 6 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- .NET tool for enumeration processes and dumping memory.☆57Updated 6 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- ☆70Updated 6 years ago
- ☆16Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- Quick Proof of Concept for reading a processes memory and searching for a specific string.☆10Updated 6 years ago
- ☆28Updated 7 years ago
- ☆25Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Updated 6 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago