HVNC for Cobalt Strike
☆1,332Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for HiddenDesktop
Users that are interested in HiddenDesktop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike UDRL for memory scanner evasion.☆1,016Jun 4, 2024Updated last year
- New generation of wmiexec.py☆1,289Apr 26, 2026Updated 3 weeks ago
- Remote operations commands implemented using Beacon Object Files☆1,158Mar 5, 2026Updated 2 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆700Oct 23, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Execute unmanaged Windows executables in CobaltStrike Beacons☆721Mar 4, 2023Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆288Jun 8, 2023Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆782Sep 4, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,389Oct 27, 2023Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆692Aug 15, 2025Updated 9 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆521May 19, 2025Updated last year
- An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memor…☆500Dec 7, 2025Updated 5 months ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆477Jul 6, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The swiss army knife of LSASS dumping☆2,114Sep 17, 2024Updated last year
- Situational Awareness commands implemented using Beacon Object Files☆1,802Mar 10, 2026Updated 2 months ago
- COFF file (BOF) for managing Kerberos tickets.☆326Jul 2, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,210Apr 16, 2025Updated last year
- kill anti-malware protected processes ( BYOVD )☆978Jul 21, 2023Updated 2 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆400Jan 9, 2024Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Aug 25, 2023Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆631Jun 25, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆627Jan 2, 2025Updated last year
- Inject .NET assemblies into an existing process☆506Jan 19, 2022Updated 4 years ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,055Jun 20, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆509Aug 10, 2023Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆751Jul 22, 2023Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆585Nov 23, 2025Updated 5 months ago
- Threadless Process Injection using remote function hooking.☆817Sep 4, 2024Updated last year
- Creating a repository with all public Beacon Object Files (BoFs)☆636Mar 2, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆489Jul 12, 2023Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,565Aug 20, 2024Updated last year
- Alternative Shellcode Execution Via Callbacks☆1,719Nov 11, 2022Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆256Jun 25, 2023Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,638Jul 31, 2024Updated last year
- Various Cobalt Strike BOFs☆762Oct 16, 2022Updated 3 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated 2 years ago