byt3bl33d3r / BOF-Nim
Cobalt Strike BOF Files with Nim!
☆84Updated 2 years ago
Alternatives and similar repositories for BOF-Nim:
Users that are interested in BOF-Nim are comparing it to the libraries listed below
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆139Updated 3 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆99Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆122Updated 2 years ago
- ☆56Updated 4 years ago
- A simple BOF that frees UDRLs☆116Updated 2 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆215Updated 5 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆176Updated 3 years ago
- Collection of CobaltStrike beacon object files☆102Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆101Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆91Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆56Updated 3 years ago
- ☆62Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆114Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆132Updated 2 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆113Updated 4 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆63Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…