sunsided / native-dotnet-code-injectionLinks
Injection of managed code into non-managed Windows applications
☆28Updated 6 years ago
Alternatives and similar repositories for native-dotnet-code-injection
Users that are interested in native-dotnet-code-injection are comparing it to the libraries listed below
Sorting:
- ☆33Updated 5 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆15Updated 4 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Updated 5 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆51Updated 5 years ago
- ☆26Updated 6 years ago
- Simple DLL injector written in C#☆24Updated 9 years ago
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- C++ DLL Bootstrapper for spinning up the CLR for C# Payloads☆44Updated 6 years ago
- Antivirus Emulator Fingerprints☆29Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- Spoof parent process ID☆13Updated 6 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- ☆7Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 10 months ago
- ☆41Updated 5 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last month
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆63Updated 5 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- ☆36Updated 6 years ago