0xsp-SRD / OffensivePascal
Pascal Offsec repo for malware dev and red teaming π©
β170Updated last year
Related projects β
Alternatives and complementary repositories for OffensivePascal
- WIP shellcode loader in nim with EDR evasion techniquesβ209Updated 2 years ago
- A BOF to automate common persistence tasks for red teamersβ266Updated last year
- Beacon Object File PoC implementation of KillDefenderβ214Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA pluginβ199Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR β¦β258Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process injectβ¦β227Updated last year
- Pass the Hash to a named pipe for token Impersonationβ294Updated 11 months ago
- BOF combination of KillDefender and Backstabβ156Updated last year
- New UAC bypass for Silent Cleanup for CobaltStrikeβ189Updated 3 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are aβ¦β120Updated 2 years ago
- A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use intβ¦β130Updated 4 months ago
- POC tools for exploring SMB over QUIC protocolβ122Updated 2 years ago
- A basic emulation of an "RPC Backdoor"β208Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.β377Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabsβ169Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashesβ133Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.β77Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projectsβ138Updated 2 years ago
- Useful Cobalt Strike BOFs found or used during engagementsβ131Updated last year
- Remove API hooks from a Beacon process.β262Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.β292Updated 2 years ago
- Execute shellcode files with rundll32β184Updated 9 months ago
- My CobaltStrike BOFSβ159Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW providerβ251Updated last year
- A little tool to play with the Seclogon serviceβ305Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.β297Updated 2 years ago
- A Nim implementation of reflective PE-Loading from memoryβ272Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLLβ¦β160Updated last year