rasta-mouse / DInvokeLinks
Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.
☆164Updated last year
Alternatives and similar repositories for DInvoke
Users that are interested in DInvoke are comparing it to the libraries listed below
Sorting:
- An example of using Syscalls in C# to get a meterpreter shell.☆111Updated 4 years ago
- Patch AMSI and ETW☆246Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆110Updated 2 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆195Updated 4 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 3 years ago
- ☆74Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- Find .net assemblies locally☆125Updated 3 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆323Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆194Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- ☆222Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆315Updated 2 years ago
- ☆195Updated last year
- Generate Shellcode Loaders & Injects☆156Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆101Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Updated last year
- My implementation of the GIUDA project in C++☆187Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆125Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆190Updated 3 years ago
- ☆313Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆225Updated 3 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆143Updated 2 years ago