/DynamicDotNet

A collection of various and sundry code snippets that leverage .NET dynamic tradecraft

Primary LanguageC#GNU General Public License v3.0GPL-3.0

DynamicDotNet

A collection of various and sundry code snippets that leverage .NET dynamic tradecraft

Purpose

To showcase offensive and defensive tooling and POCs that leverage .NET dynamic loading, staging, bootstrapping, types, objects, functions, etc.

Contribute

Source Code & Text Documents

All are welcome to contribute to this repository. Please submit a PR with source code file(s) (e.g. .cs, .cpp, etc.) that include the following:

  • An applicable subject directory such as /dynamic_pinvoke (if one does not exist)
  • Named 'dynamic' .NET technique or purpose in the povided text or source code file(s) (e.g. dynamic_pinvoke_definepinvokemethod_shellcode_runner.cs)
  • Descriptive comments and sourcing in provided files - e.g. purpose, reference/source(s), credit(s), proper license (if applicable), instructions/requirements, etc.

Please do not include:

  • Complex source code projects (e.g. that includes the DInvoke library)
  • Compiled code
  • Shellcode payloads (hex, base64, etc.)
  • Licensed code that violates copyrights, trademarks, etc.

Resources

  • Submit a PR to add to the LINKS.md resource file

Defense

  • Please submit yara rules to the /yara directory
  • A general /defensive_considerations directory will be added in the future

References & Resources

See LINKS.md

Ethics

Content shared in this repository is designed to help security professionals perform ethical and legal security assessments and penetration tests. Do not use for nefarious purposes.