The-Z-Labs / cli4bofs
Command line interface for (running) BOFs
☆41Updated last month
Alternatives and similar repositories for cli4bofs:
Users that are interested in cli4bofs are comparing it to the libraries listed below
- Windows C++ Implant for Exploration C2☆23Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆15Updated last year
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆103Updated last year
- A BOF/COFF loader implemented in Go and CGO.☆16Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆30Updated 6 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆75Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- Indirect NT syscalls LSASS dumper.☆40Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆79Updated last year
- A Simple PoC☆19Updated 8 months ago
- ELF Beacon Object File (BOF) Template☆45Updated 2 months ago
- A SigFlip implement in golang☆46Updated 3 years ago
- A Cobalt Strike memory evasion loader for redteamers☆97Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆67Updated 2 years ago
- old postex for grabbing a krbtgs for my current user☆29Updated last year
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 2 years ago
- ☆62Updated 11 months ago
- Evasive loader to bypass static detection☆56Updated last year
- Fork & modify of Wireguard's Memmod☆31Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- x64 version