Octoberfest7 / enumhandles_BOF
☆127Updated 7 months ago
Alternatives and similar repositories for enumhandles_BOF:
Users that are interested in enumhandles_BOF are comparing it to the libraries listed below
- ☆107Updated 2 months ago
- A Mythic agent for Windows written in C☆115Updated last week
- ☆96Updated 7 months ago
- ☆121Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆111Updated 2 months ago
- ☆120Updated last year
- TypeLib persistence technique☆110Updated 5 months ago
- Threadless shellcode injection tool☆63Updated 8 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆81Updated last week
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆148Updated last year
- ApexLdr is a DLL Payload Loader written in C☆108Updated 9 months ago
- AzureAD beacon object files☆115Updated 3 months ago
- Library of BOFs to interact with SQL servers☆163Updated last week
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆14Updated last week
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆60Updated last year
- BOF with Synthetic Stackframe☆142Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆119Updated 6 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆149Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 4 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆85Updated 3 months ago
- ☆104Updated 3 weeks ago
- ☆102Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated 2 months ago
- ☆98Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- ☆106Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- ☆125Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago