0xRedpoll / WhatsAppKeyBOF
A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.
☆75Updated 2 months ago
Alternatives and similar repositories for WhatsAppKeyBOF:
Users that are interested in WhatsAppKeyBOF are comparing it to the libraries listed below
- ☆106Updated 2 months ago
- ☆54Updated 2 months ago
- ☆97Updated 8 months ago
- Impersonate Tokens using only NTAPI functions☆70Updated last month
- TokenCert☆95Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆93Updated last month
- ☆55Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- A python script that automates a C2 Profile build☆40Updated last month
- ☆109Updated 3 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 4 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆121Updated 7 months ago
- ☆123Updated last year
- ☆52Updated 4 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated 2 months ago
- ☆126Updated 8 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- Sniffing files generator☆54Updated 2 months ago
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- Adversary Emulation Framework☆98Updated 9 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- A Mythic agent for Windows written in C☆120Updated 2 weeks ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆143Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆87Updated 3 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆65Updated 2 weeks ago
- ☆43Updated 3 weeks ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆80Updated 3 weeks ago