a BOF implementation of various registry persistence methods
☆94Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for RegPersist
Users that are interested in RegPersist are comparing it to the libraries listed below
Sorting:
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- A PowerShell console in C/C++ with all the security features disabled☆364Oct 14, 2025Updated 4 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆167Sep 22, 2025Updated 5 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆227Sep 19, 2025Updated 5 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆158Mar 26, 2025Updated 11 months ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆266Feb 22, 2025Updated last year
- ☆100Sep 1, 2024Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- ☆126Sep 1, 2024Updated last year
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Nov 2, 2025Updated 4 months ago
- ☆235Oct 8, 2024Updated last year
- bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Read…☆300Updated this week
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆137Apr 18, 2025Updated 10 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆30Feb 19, 2026Updated last week
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆334Mar 6, 2025Updated 11 months ago
- An example reference design for a proposed BOF PE☆200Jan 23, 2026Updated last month
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- ☆126Jan 23, 2025Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- adws enumeration bof☆167Feb 16, 2026Updated 2 weeks ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆82Jun 21, 2025Updated 8 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ☆64Dec 19, 2024Updated last year
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆264Sep 23, 2025Updated 5 months ago
- RPC to WebClient startup☆55Aug 19, 2025Updated 6 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month
- BOF to steal browser cookies & credentials☆500Feb 10, 2026Updated 2 weeks ago
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 8 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago