CodeXTF2 / ScreenshotBOF
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
☆349Updated last year
Alternatives and similar repositories for ScreenshotBOF:
Users that are interested in ScreenshotBOF are comparing it to the libraries listed below
- COM Hijacking VOODOO☆262Updated this week
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆376Updated last year
- UDRL for CS☆419Updated last year
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆354Updated 2 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆369Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆446Updated 6 months ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆445Updated 10 months ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆430Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆201Updated 2 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆314Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago
- ☆238Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆394Updated 11 months ago
- Terminate AV/EDR Processes using kernel driver☆340Updated last year
- A Visual Studio template used to create Cobalt Strike BOFs☆289Updated 3 years ago
- ☆316Updated last year
- A BOF to automate common persistence tasks for red teamers☆271Updated last year
- Persistence by writing/reading shellcode from Event Log☆370Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆361Updated last year
- not a reverse-engineered version of the Cobalt Strike Beacon☆343Updated 9 months ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆294Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆271Updated 9 months ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆458Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆209Updated 2 years ago
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆284Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆301Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆134Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆366Updated last year
- CPP AV/EDR Killer☆371Updated last year
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago