Skip to content

Repository to gather the .NET malware I will be developing

Notifications You must be signed in to change notification settings

ricardojoserf/SharpNado

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SharpNado

Repository to link to the tools or implementations related with malware I will be writting in C#:

  • FakeRebootAlert: Simple Windows Forms App to deceive users into rebooting the system upon login

  • GetModuleHandle: GetModuleHandle implementation in C# using only NtQueryInformationProcess by walking the PEB in 32-bit or 64-bit processes

  • GetModuleHandleRemote: GetModuleHandle implementation in C# for remote processes using only NTAPIs

  • GetProcAddress: GetProcAddress implementation in C# using only NtReadVirtualMemory by walking the PEB in 32-bit or 64-bit processes

  • GetProcessByName: Get processes from process name using NtGetNextProcess and GetProcessImageFileName syscalls

  • GuardPagesHooking: C# implementation of Guard Pages API Hooking (also known as VEH hooking)

  • Jeringuilla: Process injection framework in C#. It uses dynamic function loading using delegates and AES-encryption for strings and payloads

  • Lsass-dump-csharp: Custom lsass.exe dump using C#: XOR-encoding, Dynamic function resolution, using NTAPIs...

  • MinidumpParser - C# program to parse Microsoft Minidump files

  • NativeBypassCredGuard: Bypass Credential Guard by patching WDigest.dll using only NTAPI functions

  • NativeDump - Dump lsass using only NTAPIs by hand-crafting Minidump files (without MinidumpWriteDump)

  • Non-ms-binaries: Code snippet to create a process using the "PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON" flag

  • P-Invoke.net - P/Invoke definitions from the now offline pinvoke.net - Website: https://www.p-invoke.net/

  • SharpADS: Read, write and delete Alternate Data Streams (ADS) within NTFS, to hide malicious payloads

  • SharpCovertTube: Youtube as covert-channel - Control Windows systems remotely and execute commands by uploading videos to Youtube

  • SharpEA: Read, write and delete Extended Attributes (EAs) within NTFS, to hide malicious payloads

  • SharpObfuscate: Obfuscate payloads using IPv4, IPv6, MAC or UUID strings

  • SharpNtdllOverwrite: Overwrite ntdll.dll ".text" section to bypass API hooking. Getting the clean ntdll.dll from disk, Knowndlls folder, a debugged process or a URL

  • SharpProcessDump: Dump memory regions of a process using only native API calls (NtQueryVirtualMemory and NtReadVirtualMemory)

  • SharpSelfDelete: PoC to self-delete a binary in C#. The process continues but the .exe file is removed from disk

  • StealthyEnv: Stealthier alternative to whoami.exe in C#, it gets environment variables from PEB (PRTL_USER_PROCESS_PARAMETERS)

  • TrickDump: Dump lsass using only NTAPIS running 3 programs to create 3 JSON and 1 ZIP file... and generate the Minidump later!

  • WhoamiAlternatives: Different methods to get current username without using whoami, based on vx-underground posts

About

Repository to gather the .NET malware I will be developing

Topics

Resources

Stars

Watchers

Forks

Sponsor this project