Ne0nd0g / go-coff
Load and execute a common object file format (COFF) in the current process
☆28Updated 11 months ago
Alternatives and similar repositories for go-coff:
Users that are interested in go-coff are comparing it to the libraries listed below
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆18Updated last year
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- Sleep Obfuscation☆43Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- Shellcode reflective DLL injection in Rust☆19Updated 11 months ago
- BOF for C2 framework☆39Updated 3 months ago
- Sliver agent rewritten in C++☆44Updated 5 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- Unpacker for donut shellcode☆17Updated 4 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- ☆49Updated 3 weeks ago
- ☆43Updated last year
- ☆19Updated 8 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆42Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 5 months ago
- ☆28Updated 8 months ago
- ☆47Updated last year
- A VSCode plugin to assist with BOF development.☆33Updated 6 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆42Updated last year
- Bunch of BOF files☆27Updated 2 months ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Windows C++ Implant for Exploration C2☆25Updated last week
- ☆16Updated 6 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆46Updated last year