BOF to decrypt Signal Desktop chat logs
☆70Feb 20, 2025Updated last year
Alternatives and similar repositories for SignalKeyBOF
Users that are interested in SignalKeyBOF are comparing it to the libraries listed below
Sorting:
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated 2 months ago
- An example reference design for a proposed BOF PE☆202Jan 23, 2026Updated last month
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆158Mar 26, 2025Updated 11 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆52May 4, 2025Updated 10 months ago
- ☆147Nov 6, 2025Updated 4 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- Your Skyfall Infrastructure Pack☆91Jan 25, 2026Updated last month
- ☆126Sep 1, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Library of BOFs to interact with SQL servers☆227Dec 3, 2025Updated 3 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆98Mar 20, 2023Updated 2 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 3 weeks ago
- ☆139Nov 17, 2025Updated 4 months ago
- Windows rootkit designed to work with BYOVD exploits☆217Jan 18, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆78Feb 24, 2026Updated 3 weeks ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆369Oct 14, 2025Updated 5 months ago
- BOF with Synthetic Stackframe☆233Oct 30, 2025Updated 4 months ago
- ☆160Apr 17, 2024Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year