CCob / SQL-BOFLinks
Library of BOFs to interact with SQL servers
☆16Updated 10 months ago
Alternatives and similar repositories for SQL-BOF
Users that are interested in SQL-BOF are comparing it to the libraries listed below
Sorting:
- ☆49Updated 3 months ago
- ☆45Updated 4 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- Click Once + App Domain☆64Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- Lockless BOF☆79Updated 5 months ago
- TokenCert☆100Updated 11 months ago
- SAM Dumping in C#☆54Updated 9 months ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Updated last year
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆49Updated 3 months ago
- A VSCode plugin to assist with BOF development.☆37Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated last year
- ☆98Updated last year
- BypassCredGuard CS BOF☆47Updated 9 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆41Updated last year
- Local SYSTEM auth trigger for relaying - X☆146Updated 3 months ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Updated 10 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 6 months ago
- ☆53Updated last month
- ☆34Updated 7 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆27Updated last year
- ☆45Updated 3 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆48Updated 7 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆17Updated 4 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆23Updated last year
- ☆28Updated last year
- ☆32Updated last year