EspressoCake / ReadRemoteProcessCommandline_BOFLinks
☆26Updated last year
Alternatives and similar repositories for ReadRemoteProcessCommandline_BOF
Users that are interested in ReadRemoteProcessCommandline_BOF are comparing it to the libraries listed below
Sorting:
- A VSCode plugin to assist with BOF development.☆37Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆25Updated 3 years ago
- ☆35Updated 6 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆43Updated last year
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 4 months ago
- ☆41Updated last month
- Click Once + App Domain☆63Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆21Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated 11 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated last year
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- ☆24Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- SAM Dumping in C#☆51Updated 7 months ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆26Updated 3 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆62Updated 3 years ago
- ☆17Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 4 months ago
- ☆47Updated 2 months ago
- ☆28Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago