{"id":13362646,"url":"https://github.com/matterpreter/OffensiveCSharp","last_synced_at":"2025-03-12T15:30:58.489Z","repository":{"id":41374926,"uuid":"169334963","full_name":"matterpreter/OffensiveCSharp","owner":"matterpreter","description":"Collection of Offensive C# Tooling","archived":false,"fork":false,"pushed_at":"2023-02-06T14:56:26.000Z","size":144,"stargazers_count":1412,"open_issues_count":8,"forks_count":246,"subscribers_count":38,"default_branch":"master","last_synced_at":"2025-03-11T06:14:21.835Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"C#","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-3-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/matterpreter.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2019-02-06T00:32:29.000Z","updated_at":"2025-03-10T11:28:19.000Z","dependencies_parsed_at":"2023-02-19T09:01:35.410Z","dependency_job_id":null,"html_url":"https://github.com/matterpreter/OffensiveCSharp","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/matterpreter%2FOffensiveCSharp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/matterpreter%2FOffensiveCSharp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/matterpreter%2FOffensiveCSharp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/matterpreter%2FOffensiveCSharp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/matterpreter","download_url":"https://codeload.github.com/matterpreter/OffensiveCSharp/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243242715,"owners_count":20259807,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-29T23:00:58.262Z","updated_at":"2025-03-12T15:30:58.421Z","avatar_url":"https://github.com/matterpreter.png","language":"C#","readme":"# OffensiveCSharp\nThis is a collection of C# tooling and POCs I've created for use on operations. Each project is designed to use no external libraries. Open each project's .SLN in Visual Studio and compile as \"Release\".\n\n\n| Project | Description | Minimum .NET Version |\n| :------ | :---------- | :----------- |\n| **AbandonedCOMKeys** | Enumerates abandoned COM keys (specifically `InprocServer32`). Useful for persistence as you can, in some cases, write to the missing location and call with `rundll32.exe -sta {CLSID}`. Technique referenced in [this post](https://bohops.com/2018/06/28/abusing-com-registry-structure-clsid-localserver32-inprocserver32/) by [@bohops](https://twitter.com/bohops) | 4.0 |\n| **COMHunter** | Enumerates COM servers set in `LocalServer32` and `InProc32` keys on a system using WMI | 4.0 |\n| **CredPhisher** | Prompts the current user for their credentials using the `CredUIPromptForWindowsCredentials` WinAPI function. Supports an argument to provide the message text that will be shown to the user. | 3.5 |\n| **DriverQuery** | Collect details about drivers on the system and optionally filter to find only ones not signed by Microsoft | 3.5 |  \n| **EncryptedZIP** | Compresses a directory or file and then encrypts the ZIP file with a supplied key using AES256 CFB. This assembly also clears the key out of memory using `RtlZeroMemory`. Use the included Decrypter progam to decrypt the archive. | 3.5 |  \n| **ETWEventSubscription** | Similar to WMI event subscriptions but leverages Event Tracing for Windows. When the event on the system occurs, currently either when any user logs in or a specified process is started, the `DoEvil()` method is executed. | 4.6 |  \n| **GPSCoordinates** | Tracks the system's GPS coordinates (accurate within 1km currently) if Location Services are enabled. Works on Windows 10 currently, but hoping to cover all versions 7+. | 4.0 |\n| **HijackHunter** | Parses a target's PE header in order to find lined DLLs vulnerable to hijacking. Provides reasoning and abuse techniques for each detected hijack opportunity | 4.0 |\n| **HookDetector** | Detects hooked Native API functions in the current process, indicating the presence of EDR | 4.0 |\n| **ImplantSSP** | Installs a user-supplied Security Support Provider (SSP) DLL on the system, which will be loaded by LSA on system start.  The DLL must export `SpLsaModeInitialize`. Inspired by [Install-SSP](https://powersploit.readthedocs.io/en/latest/Persistence/Install-SSP/) by [@mattifestation](https://twitter.com/mattifestation).  | 3.5 |\n| **InspectAssembly** | Inspect's a target .NET assembly's CIL for calls to deserializers and .NET remoting usage to aid in triaging potential privilege escalations. | 4.0 |\n| **JunctionFolder** | Creates a junction folder in the Windows Accessories Start Up folder as described in the Vault 7 leaks. On start or when a user browses the directory, the referenced DLL will be executed by `verclsid.exe` in medium integrity. | 3.5 |\n| **MockDirUACBypass** | Creates a mock trusted directory, `C:\\Windows \\System32\\`, and moves an auto-elevating Windows executable into the mock directory. A user-supplied DLL which exports the appropriate functions is dropped and when the executable is run, the DLL is loaded and run as high integrity. Technique discovered by [@ce2wells](https://twitter.com/ce2wells) and outlined in [this post.](https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e) | 3.5 |\n| **PhantomService** | Searches for and removes non-ASCII services that can't be easily removed by built-in Windows tools. [Reference](https://twitter.com/matterpreter/status/1218290309500669952) | 4.0 |\n| **SessionSearcher** | Searches all connected drives for PuTTY private keys and RDP connection files and parses them for relevant details. Based on [SessionGopher](https://github.com/Arvanaghi/SessionGopher) by [@arvanaghi](https://twitter.com/arvanaghi). | 4.0 |\n| **UnquotedPath** | Outputs a list of unquoted service paths that aren't in System32/SysWow64 to plant a PE into. [ATT\u0026CK Reference](https://attack.mitre.org/techniques/T1034/) | 3.5 |\n","funding_links":[],"categories":["Operating Systems"],"sub_categories":["Windows"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmatterpreter%2FOffensiveCSharp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmatterpreter%2FOffensiveCSharp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmatterpreter%2FOffensiveCSharp/lists"}