WafflesExploits / CobaltStrike-YARA-Bypass-f0b627fc
Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
☆35Updated 5 months ago
Alternatives and similar repositories for CobaltStrike-YARA-Bypass-f0b627fc:
Users that are interested in CobaltStrike-YARA-Bypass-f0b627fc are comparing it to the libraries listed below
- ASPX ShellCode Loader☆49Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated 2 years ago
- Help red teams find opsec processes during engagements☆36Updated 3 months ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆46Updated 3 weeks ago
- ☆47Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆42Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated 11 months ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆71Updated last year
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆44Updated 7 months ago
- 一个普通的BOF用来BypassUAC☆18Updated 11 months ago
- ☆78Updated last year
- Homemade Aggressor scripts kit for Cobalt Strike☆57Updated 2 weeks ago
- Library of BOFs to interact with SQL servers☆160Updated 3 months ago
- CVE-2023-21707 EXP☆28Updated last year
- command execute without 445 port☆53Updated 3 years ago
- A Simple PoC☆20Updated 9 months ago
- Silently Install Chrome Extension For Persistence☆49Updated 8 months ago
- A Cobalt Strike memory evasion loader for redteamers☆98Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆42Updated 10 months ago
- ☆21Updated last year
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Updated 2 years ago
- CVE-2024-40711-exp☆39Updated 5 months ago
- Winsocket for Cobalt Strike.☆97Updated last year
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆42Updated 2 years ago
- Evasive loader to bypass static detection☆57Updated last year
- ShellCodeLoader via DInvoke☆55Updated 3 years ago
- dump lsass tool☆39Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 3 years ago