rasta-mouse / DInvoke
Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.
☆145Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for DInvoke
- An example of using Syscalls in C# to get a meterpreter shell.☆107Updated 3 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆170Updated 8 months ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆101Updated last year
- Patch AMSI and ETW☆233Updated 6 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆135Updated 6 months ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆178Updated 2 years ago
- Hookers are cooler than patches.☆166Updated 2 years ago
- Find .net assemblies locally☆92Updated 2 years ago
- Simple C# implementation of PowerUpSQL☆93Updated 4 months ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆227Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆184Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆174Updated 3 months ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆163Updated 2 years ago
- ☆142Updated last year
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆131Updated 2 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆148Updated 10 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆138Updated 2 years ago
- ☆138Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆251Updated last year
- Simple BOF to read the protection level of a process☆104Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆282Updated last year
- Patching AmsiOpenSession by forcing an error branching☆144Updated last year
- Fully modular persistence framework☆248Updated last year
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆139Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆154Updated 4 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆153Updated 10 months ago