M1ndo / WerDumpView external linksLinks
A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass
☆165Sep 22, 2025Updated 4 months ago
Alternatives and similar repositories for WerDump
Users that are interested in WerDump are comparing it to the libraries listed below
Sorting:
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- ☆123Jan 23, 2025Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Dec 21, 2025Updated last month
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆122Jan 17, 2026Updated 3 weeks ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆135Apr 18, 2025Updated 9 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 6 months ago
- adws enumeration bof☆162Oct 2, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 9 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆182Jan 17, 2026Updated 3 weeks ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- AppLocker-Based EDR Neutralization☆289Dec 19, 2025Updated last month
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆61Dec 25, 2025Updated last month
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆169Sep 3, 2025Updated 5 months ago
- Port of Cobalt Strike's Process Inject Kit☆190Dec 1, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Dec 11, 2024Updated last year
- ☆137Nov 17, 2025Updated 2 months ago
- BOF to decrypt Signal Desktop chat logs☆72Feb 20, 2025Updated 11 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 6 months ago
- a BOF implementation of various registry persistence methods☆95Nov 11, 2025Updated 3 months ago
- ☆50May 4, 2025Updated 9 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Oct 4, 2024Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆204Aug 21, 2025Updated 5 months ago
- ☆100Sep 1, 2024Updated last year
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆259Updated this week
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆63Jan 13, 2026Updated last month
- Lateral Movement Bof with MSI ODBC Driver Install☆144Sep 30, 2025Updated 4 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆166Jan 12, 2026Updated last month
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆332Mar 6, 2025Updated 11 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Powershell and python utilties for Entra Connect☆27Jun 5, 2025Updated 8 months ago