Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/lesnuages/go-execute-assembly
Allow a Go process to dynamically load .NET assemblies
https://github.com/lesnuages/go-execute-assembly
Last synced: 28 days ago
JSON representation
Allow a Go process to dynamically load .NET assemblies
- Host: GitHub
- URL: https://github.com/lesnuages/go-execute-assembly
- Owner: lesnuages
- Created: 2019-02-13T19:29:33.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2020-03-28T18:11:30.000Z (over 4 years ago)
- Last Synced: 2024-02-15T10:36:06.175Z (10 months ago)
- Language: Go
- Size: 120 KB
- Stars: 146
- Watchers: 6
- Forks: 27
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- cybersecurity-golang-security - go-execute-assembly - Allow a Go process to dynamically load .NET assemblies. (Windows Specific)
- awesome-go-security - go-execute-assembly - Allow a Go process to dynamically load .NET assemblies. (Windows Specific)
- awesome-hacking-lists - lesnuages/go-execute-assembly - Allow a Go process to dynamically load .NET assemblies (Go)
README
# go-execute-assembly
## Details
This project is mainly a Go port of [metasploit-execute-assembly](https://github.com/b4rtik/metasploit-execute-assembly) from [@b4rtik](https://github.com/b4rtik/).
It starts a `notepad.exe` process, use reflective DLL injection to inject the .NET CLR hosting DLL, as well as the assembly to run and its arguments.
If you don't trust the DLL, you can build your own version from [here](https://github.com/b4rtik/metasploit-execute-assembly/tree/master/HostingCLR_inject).
The code will determine the offset for the RefelctiveLoader automatically.## Usage
Compile, then run with:
```
PS> execute-assembly.exe PATH_TO_ASSEMBLY PATH_TO_HOSTING_DLL
```The [main.go](https://github.com/lesnuages/go-execute-assembly/blob/master/main.go) is an exemple, feel free to adapt to your needs.