rasta-mouse / CsWhispersLinks
Source generator to add D/Invoke and indirect syscall methods to a C# project.
☆186Updated last year
Alternatives and similar repositories for CsWhispers
Users that are interested in CsWhispers are comparing it to the libraries listed below
Sorting:
- My implementation of the GIUDA project in C++☆189Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆212Updated last year
- ☆216Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆207Updated 2 years ago
- Find .net assemblies locally☆131Updated 3 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- ☆198Updated 10 months ago
- Local SYSTEM auth trigger for relaying☆168Updated 6 months ago
- ☆137Updated 2 months ago
- An App Domain Manager Injection DLL PoC on steroids☆210Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated last year
- Library of BOFs to interact with SQL servers☆220Updated 2 months ago
- ☆94Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Updated 7 months ago
- Your syscall factory☆126Updated 3 weeks ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Updated last year
- ☆186Updated 7 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Updated 10 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆195Updated 3 months ago
- ☆235Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Updated 2 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆111Updated 2 years ago
- Build sneaky & malicious LNK files.☆159Updated 6 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆169Updated 5 months ago
- ☆209Updated 2 years ago
- ☆123Updated last year
- Tool for viewing NTDS.dit☆191Updated 10 months ago