rasta-mouse / CsWhispers
Source generator to add D/Invoke and indirect syscall methods to a C# project.
☆167Updated 6 months ago
Related projects: ⓘ
- Patch AMSI and ETW☆227Updated 4 months ago
- My implementation of the GIUDA project in C++☆152Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- ☆172Updated 9 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆262Updated last year
- ☆119Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated 8 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆143Updated last year
- Weaponized HellsGate/SigFlip☆188Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆104Updated 4 months ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆101Updated last year
- Find .net assemblies locally☆85Updated last year
- ☆174Updated 5 months ago
- ☆131Updated 3 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆214Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆134Updated 4 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆268Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆171Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆242Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 3 months ago
- ☆138Updated this week
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆114Updated last month
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆91Updated last year
- ☆113Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- An App Domain Manager Injection DLL PoC on steroids☆155Updated 9 months ago
- Execute shellcode files with rundll32☆171Updated 7 months ago
- ☆143Updated last year
- Disconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines☆55Updated 2 weeks ago