Cobalt-Strike / bof_template
A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use internal Beacon APIs. BOFs are a way to rapidly extend the Beacon agent with new post-exploitation features.
☆180Updated last month
Alternatives and similar repositories for bof_template:
Users that are interested in bof_template are comparing it to the libraries listed below
- A Visual Studio template used to create Cobalt Strike BOFs☆304Updated 3 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆383Updated last year
- A BOF to automate common persistence tasks for red teamers☆276Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆224Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆232Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆320Updated 2 years ago
- Patch AMSI and ETW☆239Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆194Updated last month
- A little tool to play with the Seclogon service☆312Updated 2 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆456Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆305Updated last year
- Reuse open handles to dynamically dump LSASS.☆243Updated last year
- Beacon Object File PoC implementation of KillDefender☆227Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆291Updated last year
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆135Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆108Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- Attempt at Obfuscated version of SharpCollection☆206Updated 3 weeks ago
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- WIP shellcode loader in nim with EDR evasion techniques☆216Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆241Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆453Updated 10 months ago
- Useful Cobalt Strike BOFs found or used during engagements☆139Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆200Updated 3 years ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆165Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆330Updated 2 years ago
- You shall pass☆259Updated 2 years ago
- A BOF to determine Windows Defender exclusions.☆246Updated last year
- Execute shellcode files with rundll32☆199Updated last year