DynamicDotNet: A collection of various and sundry code snippets that leverage .NET dynamic tradecraft

渗透技巧 2年前 (2023) admin
398 0 0

DynamicDotNet

A collection of various and sundry code snippets that leverage .NET dynamic tradecraft

Purpose

To showcase offensive and defensive tooling and POCs that leverage .NET dynamic loading, staging, bootstrapping, types, objects, functions, etc.

Contribute

Source Code & Text Documents

All are welcome to contribute to this repository. Please submit a PR with source code file(s) (e.g. .cs, .cpp, etc.) that include the following:

  • An applicable subject directory such as /dynamic_pinvoke (if one does not exist)
  • Named ‘dynamic’ .NET technique or purpose in the povided text or source code file(s) (e.g. dynamic_pinvoke_definepinvokemethod_shellcode_runner.cs)
  • Descriptive comments and sourcing in provided files – e.g. purpose, reference/source(s), credit(s), proper license (if applicable), instructions/requirements, etc.

Please do not include:

  • Complex source code projects (e.g. that includes the DInvoke library)
  • Compiled code
  • Shellcode payloads (hex, base64, etc.)
  • Licensed code that violates copyrights, trademarks, etc.

Resources

  • Submit a PR to add to the LINKS.md resource file

Defense

  • Please submit yara rules to the /yara directory
  • A general /defensive_considerations directory will be added in the future

References & Resources

See LINKS.md

Ethics

Content shared in this repository is designed to help security professionals perform ethical and legal security assessments and penetration tests. Do not use for nefarious purposes.

 

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...