SlimeOnSecurity / PrintSpoofer-BOFLinks
☆48Updated 3 months ago
Alternatives and similar repositories for PrintSpoofer-BOF
Users that are interested in PrintSpoofer-BOF are comparing it to the libraries listed below
Sorting:
- ☆97Updated 11 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- ☆81Updated last year
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆48Updated 2 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆97Updated last month
- Execute shellcode via Bluetooth device authentication☆40Updated 6 months ago
- ☆39Updated 2 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆101Updated last year
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆148Updated 3 weeks ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆56Updated 7 months ago
- ☆53Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆128Updated 6 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆26Updated 11 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆91Updated last month
- BypassCredGuard CS BOF☆44Updated 7 months ago
- Bypassing Amsi using LdrLoadDll☆45Updated 7 months ago
- ☆124Updated 11 months ago
- ☆73Updated last year
- Threadless shellcode injection tool☆66Updated last year
- Less sugar (entropy) for your binaries☆34Updated 5 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 5 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆17Updated 2 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆102Updated 3 months ago
- A C# port from Invoke-GhostTask☆118Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆51Updated 3 months ago
- ☆50Updated last month
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆56Updated this week
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆128Updated 4 months ago