chryzsh / awesome-bofLinks
π§ The ultimate, community-curated resource for Beacon Object Files (BOFs) β tutorials, how-tos, deep dives, and reference materials.
β87Updated last week
Alternatives and similar repositories for awesome-bof
Users that are interested in awesome-bof are comparing it to the libraries listed below
Sorting:
- ForsHopsβ149Updated 6 months ago
- AzureAD beacon object filesβ127Updated 9 months ago
- β120Updated 6 months ago
- adws enumeration bofβ137Updated last week
- Lateral Movement Bof with MSI ODBC Driver Installβ106Updated last week
- Evasive Payload Delivery Server & C2 Redirectorβ105Updated 2 months ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rustβ54Updated last year
- Local SYSTEM auth trigger for relayingβ162Updated 2 months ago
- Lateral movement with DCOM DLL hijackingβ141Updated 3 months ago
- Internal Monologue BOFβ72Updated 9 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.β102Updated 5 months ago
- β135Updated last month
- β126Updated 8 months ago
- A hoontr must hoontβ98Updated 2 months ago
- β120Updated 8 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencieβ¦β154Updated last month
- A python script that automates a C2 Profile buildβ47Updated last month
- Local SYSTEM auth trigger for relaying - Xβ142Updated 2 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.β12Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpointsβ113Updated 3 months ago
- PoC framework for Sliver compilationβ22Updated 8 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pβ¦β155Updated this week
- Stage 0β164Updated 9 months ago
- β124Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingβ130Updated 3 months ago
- Generate Secure, Polymorphic, Evasive Payloadsβ25Updated last week
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ192Updated 10 months ago
- A Mythic agent for Windows written in Cβ136Updated last month
- .NET assembly loader with patching AMSI and ETW bypassβ31Updated 5 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flagβ125Updated last month