tandasat / DotNetHooking
Sample use cases of the .NET native code hooking technique
☆208Updated 7 years ago
Alternatives and similar repositories for DotNetHooking:
Users that are interested in DotNetHooking are comparing it to the libraries listed below
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- ☆213Updated 6 years ago
- Ruxcon2016 POC Code☆137Updated 8 years ago
- Driver Initial Reconnaissance Tool☆121Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆148Updated 5 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆267Updated 4 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆233Updated 4 years ago
- ☆392Updated 7 years ago
- An attempt at Process Doppelgänging☆184Updated 7 years ago
- ☆231Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- ☆107Updated 4 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆293Updated 6 years ago
- A simple utility to list all methods of a given .NET Assembly and to invoke them☆73Updated 3 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆219Updated last year
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆156Updated 5 years ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆162Updated 6 years ago
- Load a Windows Kernel Driver☆91Updated 7 years ago
- ☆140Updated 7 years ago
- Process Doppelgänging☆156Updated 7 years ago
- Hyper-V Research is trendy now☆177Updated 9 months ago
- A command tree based on commands and extensions for Windows Kernel Debugging.☆107Updated 4 years ago
- Position Independent Windows Shellcode Written in C☆287Updated 6 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- ☆113Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆320Updated 7 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Updated 2 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆180Updated 5 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago