rasta-mouse / DInvokeLinks
Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.
☆168Updated last year
Alternatives and similar repositories for DInvoke
Users that are interested in DInvoke are comparing it to the libraries listed below
Sorting:
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆110Updated 2 years ago
- Patch AMSI and ETW☆250Updated last year
- Hookers are cooler than patches.☆170Updated 3 years ago
- An example of using Syscalls in C# to get a meterpreter shell.☆111Updated 4 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆185Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆153Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆197Updated 4 years ago
- ☆77Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆199Updated last year
- Find .net assemblies locally☆129Updated 3 years ago
- Generate Shellcode Loaders & Injects☆158Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆324Updated 2 years ago
- ☆223Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆324Updated 2 years ago
- ☆206Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆189Updated 3 years ago
- ☆215Updated 2 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆102Updated 3 years ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆146Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆136Updated 3 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆209Updated 2 years ago
- My implementation of the GIUDA project in C++☆188Updated 2 years ago
- D/Invoke standalone shellcode runners☆39Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆197Updated 3 years ago