cube0x0 / BofRoast
Beacon Object Files for roasting Active Directory
☆223Updated 3 years ago
Alternatives and similar repositories for BofRoast:
Users that are interested in BofRoast are comparing it to the libraries listed below
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆289Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆296Updated 2 years ago
- UDRL for CS☆420Updated last year
- Pass the Hash to a named pipe for token Impersonation☆300Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- C# Lsass parser☆284Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆333Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆273Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆190Updated 2 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆458Updated 3 years ago
- Remove API hooks from a Beacon process.☆268Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆261Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆239Updated 3 years ago
- Koppeling x Metatwin x LazySign☆206Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆139Updated 3 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆199Updated 11 months ago
- C# version of Powermad☆160Updated last year
- Persistence by writing/reading shellcode from Event Log☆367Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆329Updated 3 years ago
- Collection of remote authentication triggers in C#☆475Updated 10 months ago
- Remotely enables Restricted Admin Mode☆206Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆215Updated last year
- Fully modular persistence framework☆251Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆332Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆320Updated last year
- COM Hijacking VOODOO☆268Updated this week