About 4,780 results
Open links in new tab
  1. Writing an exploit | Metasploit Documentation Penetration …

    The real kung-fu behind exploit development isn’t actually about which language you choose to build it; it’s about your precise understanding of how input is processed by the application …

  2. The WinRAR Exploit Builder is a C# project designed to create an ...

    This project contains a WinRAR Exploit developed using the C# language. The exploit is a piece of software designed to target a vulnerability in the WinRAR software to run two specific files …

  3. Brute Force Attack Example with C#: A Step-by-Step Guide for …

    Mar 27, 2023 · In this article, we will walk you through creating a simple brute-force attack tool using C# for ethical hacking purposes. By understanding how these attacks work, you can …

  4. Hacking with C# : r/hacking - Reddit

    Nov 29, 2021 · Well, you may be able to create some pretty powerful tools with it, who knows? As far as "very proficient" goes with C#, though...you're going to need to understand lower level …

  5. c# - Hacking your own application - Stack Overflow

    Aug 17, 2014 · Learn the best practices, and consider each method and class that you write from a security perspective. This goes hand in hand with unit testing, try to consider what inputs …

  6. Custom Exploit Development - PenTesting.Org

    Jan 21, 2025 · Start with thorough reconnaissance of the target system or application to understand its architecture and potential weak points. Analyze the target’s behavior through …

  7. Chapter 11: Automating Metasploit - Gray Hat C# [Book]

    You’ll learn how to use the RPC to automate Metasploit to exploit Metasploitable 2, an intentionally vulnerable Linux machine designed for learning how to use Metasploit. Red teams …

  8. Game Hacking in C# | Lorenzo Meacci

    In this blog post, I’ll guide you through scanning for memory values in games using Cheat Engine and show you how to create cheat scripts in C#. Additionally, I’ll teach you how to build reliable …

  9. SharpSploit – A .NET Post-Exploitation Library Written in C#

    Sep 27, 2018 · SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers. It is …

  10. .NET serialization/deserialization – basic C# attack example

    Mar 2, 2018 · In this post we’ll have a closer look at .NET serialization/deserialization attacks. We’ll have a .NET (C#) vulnerable code as an example (inspired by James’s work) and we will …

  11. Some results have been removed
Refresh