Explore advanced techniques for developing flexible and secure .NET-based offensive toolkits in this conference talk from NorthSec. Learn how to maintain operational agility and overcome static defensive mechanisms through dynamic code compilation, reflective .NET DLR, and on-the-fly access to native Windows API. Discover methods for hiding sensitive execution aspects in managed code memory using the DLRium Managed Execution toolkit. Gain insights into OpSec lessons, slim payload delivery, and evasion mechanisms. Dive deep into topics such as CodeDom, reflective loading, application domains, dynamic interrupts, and memory mapping. Understand the strategic and technical goals of retooling in the field, and how to leverage various programming languages like C#, Python, and PowerShell for effective red team operations.