TierZeroSecurity / killerPID-BOFLinks
BOF to terminate a process via PID as argument
☆28Updated 4 months ago
Alternatives and similar repositories for killerPID-BOF
Users that are interested in killerPID-BOF are comparing it to the libraries listed below
Sorting:
- ☆33Updated last year
- A VSCode plugin to assist with BOF development.☆37Updated last year
- ☆31Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- ☆53Updated 4 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Updated 7 months ago
- ☆50Updated 6 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated 2 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 10 months ago
- BypassCredGuard CS BOF☆48Updated last year
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆47Updated last week
- ☆47Updated last month
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- ☆51Updated 7 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Updated last year
- ☆38Updated 11 months ago
- SAM Dumping in C#☆54Updated 2 months ago
- Less sugar (entropy) for your binaries☆34Updated 4 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 7 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Updated last year
- ☆33Updated 10 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Updated 2 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Updated 7 months ago