netero1010 / RDPHijack-BOF
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.
☆299Updated 2 years ago
Alternatives and similar repositories for RDPHijack-BOF:
Users that are interested in RDPHijack-BOF are comparing it to the libraries listed below
- A BOF to automate common persistence tasks for red teamers☆273Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆296Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆200Updated 3 years ago
- COM Hijacking VOODOO☆268Updated last week
- MS-FSRVP coercion abuse PoC☆287Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆221Updated 2 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆447Updated 11 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- Useful Cobalt Strike BOFs found or used during engagements☆138Updated last year
- Pass the Hash to a named pipe for token Impersonation☆301Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆136Updated 3 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆174Updated 2 years ago
- A Visual Studio template used to create Cobalt Strike BOFs☆297Updated 3 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆230Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆129Updated 2 years ago
- ☆214Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- WIP shellcode loader in nim with EDR evasion techniques☆210Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- Fileless atexec, no more need for port 445☆364Updated 11 months ago
- A BOF to determine Windows Defender exclusions.☆243Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 2 years ago
- MSSQL Database Attacker tool☆191Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆178Updated 2 years ago
- C# Lsass parser☆289Updated 3 years ago
- Weaponized HellsGate/SigFlip☆198Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆231Updated last year