Patrick0x41 / BOF_All_Things
Beacon Object Files (BOF) for Cobalt Strike.
☆29Updated 8 months ago
Alternatives and similar repositories for BOF_All_Things
Users that are interested in BOF_All_Things are comparing it to the libraries listed below
Sorting:
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- SAM Dumping in C#☆48Updated 4 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated last year
- ☆28Updated 11 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- in-process powershell runner for BRC4☆45Updated last year
- BOF for C2 framework☆41Updated 6 months ago
- ☆48Updated 2 years ago
- ☆55Updated 6 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆36Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆28Updated this week
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 4 months ago
- ☆54Updated 3 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated 2 months ago
- ☆48Updated last year
- ☆71Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last week
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 9 months ago
- BOF to decrypt Signal Desktop chat logs☆65Updated 2 months ago
- ☆52Updated 4 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated 11 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆35Updated this week
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year