ElJaviLuki / CobaltStrike_OpenBeacon
Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.
☆201Updated 11 months ago
Alternatives and similar repositories for CobaltStrike_OpenBeacon:
Users that are interested in CobaltStrike_OpenBeacon are comparing it to the libraries listed below
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆383Updated 6 months ago
- Execute shellcode files with rundll32☆190Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- Port of Cobalt Strike's Process Inject Kit☆165Updated 2 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆343Updated 2 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 6 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆185Updated 4 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆172Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆278Updated 3 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆289Updated 10 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆145Updated 5 months ago
- Stealthily inject shellcode into an executable☆148Updated 3 weeks ago
- ☆159Updated 6 months ago
- Extracting NetNTLM without touching lsass.exe