This document summarizes techniques for red teaming using the .NET framework in 3 parts. It discusses [1] executing custom assemblies using Windows Script Host file smuggling techniques, [2] achieving persistence by hooking the Common Language Runtime, and [3] influencing applications to load arbitrary assemblies. References are provided for further related research on .NET instrumentation, offensive retooling, and GadgetToJScript.