0xsp-SRD / OffensivePascalLinks
Pascal Offsec repo for malware dev and red teaming π©
β186Updated 2 years ago
Alternatives and similar repositories for OffensivePascal
Users that are interested in OffensivePascal are comparing it to the libraries listed below
Sorting:
- A BOF to automate common persistence tasks for red teamersβ290Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniquesβ220Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.β300Updated 3 years ago
- A basic emulation of an "RPC Backdoor"β243Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonationβ306Updated last year
- Process Ghosting Toolβ174Updated 4 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.β131Updated 2 years ago
- β245Updated 2 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNGβ312Updated 4 years ago
- C# version of Powermadβ168Updated last year
- Collection of beacon BOF written to learn windows and cobaltstrikeβ359Updated 2 years ago
- Beacon Object File PoC implementation of KillDefenderβ236Updated 3 years ago
- A BOF to determine Windows Defender exclusions.β250Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.β311Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFSβ186Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA pluginβ202Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branchingβ148Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copyβ235Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump inβ¦β267Updated 4 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebusβ242Updated 3 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.β125Updated 3 years ago
- C# C2 Framework centered around Stage 1 operationsβ212Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabsβ187Updated 4 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process injectβ¦β241Updated 2 years ago
- A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use intβ¦β218Updated 7 months ago
- Nim Payload Generationβ61Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDRβ164Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projectsβ147Updated 3 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.β149Updated 3 years ago
- AV/EDR evasion via direct system calls.β108Updated last year