Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.
☆78Dec 15, 2025Updated 4 months ago
Alternatives and similar repositories for LDAP-Bof-Collection
Users that are interested in LDAP-Bof-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated last year
- adws enumeration bof☆172Feb 16, 2026Updated 2 months ago
- Bof of RegPwn by MDSec☆118Mar 15, 2026Updated last month
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An ARM64 Linux ELF Packer/Loader☆28Updated this week
- Exploitation of CVE-2025-29969☆64Feb 20, 2026Updated 2 months ago
- ☆36Jan 23, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 5 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 10 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 3 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆71Mar 6, 2026Updated 2 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆47Feb 6, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆81Oct 27, 2025Updated 6 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself☆94Apr 9, 2026Updated 3 weeks ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- ☆52May 4, 2025Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆118Dec 21, 2025Updated 4 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆157Nov 2, 2025Updated 6 months ago
- Atomic test units for BOF execution☆55Apr 26, 2026Updated last week
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆576Nov 23, 2025Updated 5 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆34Oct 22, 2024Updated last year
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- UDC2 implementation that provides an ICMP C2 channel☆123Nov 24, 2025Updated 5 months ago
- ☆147Nov 6, 2025Updated 6 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆104Jul 9, 2025Updated 9 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 4 months ago