Cobalt Strike BOF
☆42Dec 10, 2025Updated 2 months ago
Alternatives and similar repositories for inlineExecute
Users that are interested in inlineExecute are comparing it to the libraries listed below
Sorting:
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- adws enumeration bof☆167Feb 16, 2026Updated last week
- ☆20Sep 6, 2025Updated 5 months ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- ☆12Oct 9, 2020Updated 5 years ago
- ☆32Feb 13, 2026Updated 2 weeks ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- ☆36Aug 21, 2024Updated last year
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 2 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 2 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Shellcode injection using the Windows Debugging API☆167Jan 4, 2026Updated last month
- ☆17Aug 5, 2023Updated 2 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 4 months ago
- MacOS Shared Library to Shellcode Loader☆51Updated this week
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆82Nov 28, 2023Updated 2 years ago
- shellcode transformation tool for YARA evasion☆52Dec 17, 2025Updated 2 months ago
- Backend development stack for agents☆29Jul 30, 2025Updated 6 months ago
- BOF to run PE in Cobalt Strike Beacon without console creation☆186Nov 23, 2025Updated 3 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Mar 19, 2023Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆236Aug 25, 2024Updated last year
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆124Feb 14, 2026Updated last week
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago