FULLSHADE / WarFox
☆150Updated this week
Related projects: ⓘ
- Example code for using named pipe output with beacon ReflectiveDLLs☆108Updated 4 years ago
- Beacon Object File (BOF) for remote process injection via thread hijacking☆186Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆160Updated last year
- Evasive Process Hollowing Techniques☆132Updated 4 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆95Updated 2 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆114Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆134Updated 2 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆154Updated 3 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆169Updated last year
- ☆221Updated this week
- Remove API hooks from a Beacon process.☆263Updated 3 years ago
- ☆100Updated this week
- You shall pass☆241Updated 2 years ago
- BOF combination of KillDefender and Backstab☆153Updated last year
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆274Updated 2 years ago
- Shellcode injector using direct syscalls☆116Updated 4 years ago
- ☆99Updated this week
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆157Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆187Updated 3 years ago
- ☆140Updated this week
- Exploring in-memory execution of .NET☆130Updated 2 years ago
- Move CS beacon to GPU memory when sleeping☆212Updated 2 years ago
- ☆140Updated last year
- Experiment on reproducing Obfuscate & Sleep☆136Updated 3 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆212Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆177Updated 2 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆184Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆87Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago