kyxiaxiang / Beacon_Source
not a reverse-engineered version of the Cobalt Strike Beacon
☆353Updated 11 months ago
Alternatives and similar repositories for Beacon_Source:
Users that are interested in Beacon_Source are comparing it to the libraries listed below
- A beacon object file implementation of PoolParty Process Injection Technique.☆373Updated last year
- PE to shellcode☆184Updated 2 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆304Updated 11 months ago
- Process injection alternative☆321Updated 6 months ago
- Bypassing UAC with SSPI Datagram Contexts☆430Updated last year
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆371Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆409Updated last year
- A Tool that aims to evade av with binary padding☆147Updated 8 months ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆355Updated 2 years ago
- CPP AV/EDR Killer☆395Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆267Updated last month
- ☆237Updated last year
- A Windows potato to privesc☆356Updated 6 months ago
- ☆322Updated last month
- Credential Guard Bypass Via Patching Wdigest Memory☆321Updated 2 years ago
- ☆519Updated last year
- ☆96Updated last year
- C2 redirector base on caddy☆202Updated 9 months ago
- Loading BOF & ShellCode without executable permission memory.☆414Updated 5 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆238Updated 9 months ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆201Updated last month
- A Visual Studio template used to create Cobalt Strike BOFs☆297Updated 3 years ago
- A Beacon Object File (BOF) template for Visual Studio☆177Updated this week
- Some POCs for my BYOVD research and find some vulnerable drivers☆182Updated 6 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆571Updated 8 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆302Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆451Updated 8 months ago
- Fileless atexec, no more need for port 445☆364Updated 11 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆277Updated 9 months ago
- windows-rs shellcode loaders☆344Updated 8 months ago