Yeeb1 / MagicBOFsLinks
A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.
ā12Updated last month
Alternatives and similar repositories for MagicBOFs
Users that are interested in MagicBOFs are comparing it to the libraries listed below
Sorting:
- ForsHopsā146Updated 5 months ago
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā81Updated 3 weeks ago
- AzureAD beacon object filesā126Updated 8 months ago
- Local SYSTEM auth trigger for relaying - Xā138Updated last month
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.ā102Updated 3 months ago
- ā119Updated 7 months ago
- A python script that automates a C2 Profile buildā43Updated 5 months ago
- A collection of position independent coding resourcesā92Updated 6 months ago
- ā122Updated 7 months ago
- Lateral movement with DCOM DLL hijackingā139Updated last month
- ForsHopsā58Updated 5 months ago
- BOF with Synthetic Stackframeā166Updated 6 months ago
- Impersonate Tokens using only NTAPI functionsā80Updated 5 months ago
- ā124Updated last year
- ā119Updated 5 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strikeā149Updated last month
- Early Bird Cryo Injections ā APC-based DLL & Shellcode Injection via Pre-Frozen Job Objectsā104Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.ā35Updated 3 weeks ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā39Updated 5 months ago
- The projects im more confident in while learning Malware Developmentā11Updated this week
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpointsā112Updated last month
- ā31Updated last year
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pā¦ā142Updated this week
- Generate Secure, Polymorphic, Evasive Payloadsā21Updated 2 weeks ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā122Updated 2 months ago
- ā53Updated 3 months ago
- Local SYSTEM auth trigger for relayingā156Updated last month
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.ā67Updated last year
- Threadless shellcode injection toolā67Updated last year
- ā99Updated last year