rvrsh3ll / MSBuildAPICallerLinks
MSBuild Without MSBuild.exe
☆157Updated 4 years ago
Alternatives and similar repositories for MSBuildAPICaller
Users that are interested in MSBuildAPICaller are comparing it to the libraries listed below
Sorting:
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆85Updated 5 years ago
- CSHARP DCOM Fun☆130Updated 5 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- D/Invoke port of UrbanBishop☆107Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- Port of Invoke-Excel4DCOM☆105Updated 5 years ago
- Load C# Code straight to memory☆54Updated 5 years ago
- WMI Event Subscription Persistence in C#☆113Updated 6 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆91Updated 4 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆134Updated last year
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 4 years ago
- A little tool to play with Kerberos.☆67Updated 2 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆132Updated 6 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- ☆135Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 6 years ago
- ☆176Updated 4 years ago
- ☆46Updated 3 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 3 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 4 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- ☆71Updated 3 years ago
- ☆94Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆217Updated 5 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆102Updated 4 years ago