WafflesExploits / CobaltStrike-YARA-Bypass-f0b627fc
Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
☆10Updated last month
Related projects ⓘ
Alternatives and complementary repositories for CobaltStrike-YARA-Bypass-f0b627fc
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated 10 months ago
- Groovy Post Exploitation☆18Updated last month
- ProcExp Driver (Ab)use☆20Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆30Updated 6 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆88Updated 9 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆19Updated 5 months ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- old postex for grabbing a krbtgs for my current user☆28Updated last year
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆10Updated 5 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆38Updated 11 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆23Updated 2 months ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- ☆42Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- A VSCode plugin to assist with BOF development.☆30Updated 3 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆48Updated 2 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆48Updated 4 years ago
- ☆26Updated 3 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆35Updated 2 years ago
- Beacon Object Files (BOF) for Cobalt Strike.☆28Updated 2 months ago
- Office 365 and Exchange Enumeration Version 2☆18Updated 9 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆41Updated last year
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆36Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆43Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆37Updated 10 months ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.