ewby / Mockingjay_BOF
Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique
☆149Updated last year
Alternatives and similar repositories for Mockingjay_BOF:
Users that are interested in Mockingjay_BOF are comparing it to the libraries listed below
- Library of BOFs to interact with SQL servers☆159Updated 3 months ago
- ☆123Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- ☆78Updated last year
- ☆140Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆117Updated 5 months ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 7 months ago
- ☆94Updated 6 months ago
- ☆123Updated 6 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆80Updated last month
- ☆115Updated last year
- ☆152Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- ☆95Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- ☆85Updated 9 months ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆45Updated 2 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Lateral Movement via the .NET Profiler☆80Updated 3 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- A C# port from Invoke-GhostTask☆112Updated last year
- ☆78Updated last year
- Execute commands in other Sessions☆85Updated 7 months ago
- ☆120Updated last year