chryzsh / awesome-bofLinks
š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.
ā96Updated 3 weeks ago
Alternatives and similar repositories for awesome-bof
Users that are interested in awesome-bof are comparing it to the libraries listed below
Sorting:
- ForsHopsā152Updated 9 months ago
- ā136Updated last month
- Lateral Movement Bof with MSI ODBC Driver Installā141Updated 3 months ago
- ā125Updated 3 weeks ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspectiveā162Updated last month
- adws enumeration bofā160Updated 3 months ago
- ā64Updated 2 weeks ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.ā97Updated last month
- Evasive Payload Delivery Server & C2 Redirectorā112Updated 2 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+Sā¦ā108Updated 2 weeks ago
- ā136Updated 11 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.ā105Updated 8 months ago
- Lateral movement with DCOM DLL hijackingā174Updated 6 months ago
- Local SYSTEM auth trigger for relayingā168Updated 5 months ago
- Local SYSTEM auth trigger for relaying - Xā155Updated 5 months ago
- ā121Updated 11 months ago
- ā139Updated 2 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)ā128Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpointsā119Updated 5 months ago
- Shellcode injection using the Windows Debugging APIā124Updated this week
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.ā181Updated 2 weeks ago
- A hoontr must hoontā100Updated last month
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā134Updated 6 months ago
- Internal Monologue BOFā79Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rustā58Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)ā196Updated 11 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flagā137Updated 4 months ago
- A python script that automates a C2 Profile buildā48Updated 3 weeks ago
- A Mythic Agent written in PIC C.ā207Updated 11 months ago
- A Mythic agent for Windows written in Cā148Updated this week