dazzyddos / ClickOnceBlobberView external linksLinks
☆106Updated this week
Alternatives and similar repositories for ClickOnceBlobber
Users that are interested in ClickOnceBlobber are comparing it to the libraries listed below
Sorting:
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆23Jan 17, 2026Updated 3 weeks ago
- ☆42Jun 1, 2025Updated 8 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆102Jan 29, 2026Updated 2 weeks ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆52Sep 24, 2025Updated 4 months ago
- A C# implementation of dumping credentials from Windows Credential Manager☆61Sep 23, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆19Dec 18, 2024Updated last year
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆287Apr 29, 2025Updated 9 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- ☆18Sep 1, 2025Updated 5 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆172Sep 3, 2025Updated 5 months ago
- ☆65Mar 15, 2024Updated last year
- The PoC of CVE-2025-70795 / CVE-2026-0828 and its update☆30Updated this week
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- adws enumeration bof☆162Oct 2, 2025Updated 4 months ago
- ☆30Aug 24, 2025Updated 5 months ago
- ☆124May 12, 2021Updated 4 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- The Azure Execution Tool☆121Feb 6, 2026Updated last week
- CPL remote trigger☆43Dec 28, 2025Updated last month
- ☆41Feb 20, 2025Updated 11 months ago
- Execute shellcode via ASPNET compiler☆61Oct 2, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- AppLocker-Based EDR Neutralization☆302Dec 19, 2025Updated last month
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆104Updated this week
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Oct 30, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆321Jul 2, 2023Updated 2 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Random BOFs for LDAP tradecraft☆72Sep 9, 2025Updated 5 months ago
- Arsenal of modules to beacon postex☆93Updated this week
- ☆137Nov 17, 2025Updated 2 months ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated 10 months ago