An Aggressor Script that utilizes NtCreateUserProcess to run binaries
☆30Jan 30, 2025Updated last year
Alternatives and similar repositories for NtCreateUserProcessBOF
Users that are interested in NtCreateUserProcessBOF are comparing it to the libraries listed below
Sorting:
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Process Hollowing in Rust with Process Executable Relocation Support for both 32 and 64 bit architecture environments.☆22Jan 6, 2025Updated last year
- BOF with Synthetic Stackframe☆225Oct 30, 2025Updated 3 months ago
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- ☆29May 10, 2024Updated last year
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆199May 29, 2025Updated 9 months ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆185Jan 17, 2026Updated last month
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆105Jan 24, 2024Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- ☆109Feb 17, 2025Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆136Apr 18, 2025Updated 10 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Jul 11, 2025Updated 7 months ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- ☆15May 30, 2025Updated 8 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Port of Cobalt Strike's Process Inject Kit☆190Dec 1, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆54Feb 29, 2024Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- Position-independent Reflective Loader for macOS☆112Feb 19, 2026Updated last week
- ☆60Jan 9, 2023Updated 3 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- ☆129Jun 28, 2023Updated 2 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year