InMemoryNET
This project is entirely a POC, it was my research into looking at how execute-assembly works within Cobalt Strike.
I originally wrote this about two years ago, but I felt I needed to update to download file remotely in order to test In-Process Patchless AMSI Bypass from EthicalChaos. Albeit, this project does NOT contain that POC.
InMemoryNET will:
- Reach out to a URL
- Download a file to a buffer
- Execute via CLR
Referenced projects:
- HostingCLR
- metasploit-execute-assembly
- Hiding your .NET - ETW
Example:
~ InMemoryNET ~
InMemoryNET.exe
下载源码
通过命令行克隆项目:
git clone https://github.com/mez-0/InMemoryNET.git