cube0x0 / ParallelSyscalls
C# version of MDSec's ParallelSyscalls
☆138Updated 2 years ago
Related projects: ⓘ
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆160Updated last year
- Coerce Windows machines auth via MS-EVEN☆152Updated 8 months ago
- ☆140Updated last year
- C# version of Powermad☆152Updated 9 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆182Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆177Updated 2 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆164Updated 3 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆169Updated last year
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆139Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆169Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆117Updated 2 years ago
- Hookers are cooler than patches.☆167Updated 2 years ago
- Simple C# implementation of PowerUpSQL☆91Updated 2 months ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆157Updated 3 years ago
- ☆135Updated 2 years ago
- Cobalt Strike Beacon Object Files☆158Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆134Updated 2 years ago
- Beacon Object File PoC implementation of KillDefender☆213Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆136Updated 6 months ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆184Updated 3 years ago
- AV/EDR evasion via direct system calls.☆98Updated 9 months ago
- Exploring in-memory execution of .NET☆130Updated 2 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆265Updated last year
- ☆167Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆143Updated 3 years ago
- Collection of CobaltStrike beacon object files☆100Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆206Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆140Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆87Updated 2 years ago