7h3w4lk3r / Kill-FloorLinks
AV/EDR killer using BYOVD technique
☆36Updated last year
Alternatives and similar repositories for Kill-Floor
Users that are interested in Kill-Floor are comparing it to the libraries listed below
Sorting:
- A nim implementation of sRDI☆19Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Updated 11 months ago
- Winsocket for Cobalt Strike.☆100Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- Beacon Object Files.☆37Updated last year
- Evasive loader to bypass static detection☆59Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆46Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆53Updated 2 years ago
- A SigFlip implement in golang☆47Updated 3 years ago
- ☆41Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- A Simple PoC☆21Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated 2 years ago
- ☆16Updated 2 years ago
- Use CMSTP.exe to bypass UAC.☆50Updated 3 years ago
- More EFS coerced authentication method with PetitPotam.py☆26Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆35Updated 6 months ago
- Cs-Sleep-Mask-Fiber☆18Updated 4 months ago
- Help red teams find opsec processes during engagements☆42Updated 10 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- dump lsass tool☆38Updated 3 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆51Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆13Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆59Updated 7 months ago
- ☆42Updated 2 years ago
- ☆13Updated 3 years ago
- An Exercice for Red Team to Reverse & Exploit, that's a valide BYOVD Killer, not HVCI Blocklisted, and not in LOLBIN☆31Updated 2 months ago