mr-r3bot / bof-modulesLinks
BOF for C2 framework
☆43Updated 10 months ago
Alternatives and similar repositories for bof-modules
Users that are interested in bof-modules are comparing it to the libraries listed below
Sorting:
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆55Updated 4 months ago
- Proxy function calls through the thread pool with ease☆29Updated 6 months ago
- use python on windows with full submodule support without installation☆30Updated 7 months ago
- bring your own clean ntdll (or other MS dlls)☆27Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆68Updated 2 weeks ago
- Post-Ex BOF tooling for Hannibal☆24Updated 9 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 6 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 4 months ago
- A lexer and parser for Sleep☆20Updated 3 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- in-process powershell runner for BRC4☆47Updated last year
- ☆47Updated 2 years ago
- ☆26Updated 7 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆53Updated 3 months ago
- ☆35Updated 4 months ago
- Internal Monologue BOF☆20Updated 8 months ago
- ☆29Updated last year
- BOF to decrypt Signal Desktop chat logs☆71Updated 6 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆66Updated 2 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 7 months ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 10 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 7 months ago
- various methods of making API calls☆19Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆80Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆44Updated last year
- RPC to WebClient startup☆49Updated 3 weeks ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆67Updated last year