This project is mainly a Go port of metasploit-execute-assembly from @b4rtik.
It starts a notepad.exe
process, use reflective DLL injection to inject the .NET CLR hosting DLL, as well as the assembly to run and its arguments.
If you don't trust the DLL, you can build your own version from here.
You might have to change the offset to the ReflectiveLoader
though.
Compile, then run with:
PS> execute-assembly.exe PATH_TO_ASSEMBLY PATH_TO_HOSTING_DLL
The main.go is an exemple, feel free to adapt to your needs.