rasta-mouse / DInvokeLinks
Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.
☆162Updated last year
Alternatives and similar repositories for DInvoke
Users that are interested in DInvoke are comparing it to the libraries listed below
Sorting:
- Hookers are cooler than patches.☆170Updated 3 years ago
- Patch AMSI and ETW☆246Updated last year
- An example of using Syscalls in C# to get a meterpreter shell.☆111Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆110Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆197Updated 4 years ago
- ☆72Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆116Updated last year
- Beacon Object File & C# project to check LDAP signing☆193Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆174Updated 3 years ago
- Find .net assemblies locally☆122Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆307Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆324Updated 2 years ago
- ☆222Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆139Updated last year
- Generate Shellcode Loaders & Injects☆156Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- ☆306Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆188Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- Payload Generation Framework☆94Updated last year
- Hide your P/Invoke signatures through other people's signed assemblies☆211Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆116Updated 3 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆151Updated 4 years ago
- My implementation of the GIUDA project in C++☆185Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆137Updated 2 years ago