pwndizzle / c-sharp-memory-injection
A set of scripts that demonstrate how to perform memory injection in C#
☆308Updated 6 years ago
Related projects: ⓘ
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆229Updated last year
- Executable that mutates its own code☆368Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆665Updated last year
- Managed assembly shellcode generation☆261Updated 3 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆536Updated 3 years ago
- SharpGen is a .NET Core console application that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framework console applica…☆287Updated 3 years ago
- Collection of C# scripts☆330Updated 7 years ago
- C# Based Universal API Unhooker☆391Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆331Updated last year
- Process Injection☆750Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆417Updated last year
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆221Updated 5 years ago
- DNCI - Dot Net Code Injector☆144Updated 3 years ago
- Tool to create hidden registry keys.☆463Updated 4 years ago
- Lockless allows for the copying of locked files.☆226Updated 3 years ago
- Inject .NET assemblies into an existing process☆476Updated 2 years ago
- ☆276Updated 3 years ago
- dem sharp donuts☆185Updated 2 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆324Updated 2 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆184Updated 7 years ago
- An implementation of PSExec in C#☆315Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆852Updated 3 years ago
- Inject your x64 bit executable to any process, masking it as a legitimate process for Anti-Virus evasion.☆191Updated 3 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆342Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆214Updated last year
- Universal Unhooking☆312Updated 6 years ago
- C# tool for UAC bypasses☆398Updated 3 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆224Updated 4 years ago
- Just another Windows Process Injection☆387Updated 4 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆280Updated 2 years ago