netero1010 / RDPHijack-BOF
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.
☆299Updated 2 years ago
Alternatives and similar repositories for RDPHijack-BOF:
Users that are interested in RDPHijack-BOF are comparing it to the libraries listed below
- A BOF to automate common persistence tasks for red teamers☆273Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- COM Hijacking VOODOO☆261Updated 3 weeks ago
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago
- A Visual Studio template used to create Cobalt Strike BOFs☆289Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Fileless atexec, no more need for port 445☆354Updated 10 months ago
- MS-FSRVP coercion abuse PoC☆282Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆224Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆229Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆240Updated 2 years ago
- ☆220Updated 9 months ago
- Useful Cobalt Strike BOFs found or used during engagements☆136Updated last year
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆173Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆203Updated last week
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆204Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆127Updated 2 years ago
- C# Lsass parser☆284Updated 3 years ago
- Terminate AV/EDR Processes using kernel driver☆339Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆208Updated last year
- Pass the Hash to a named pipe for token Impersonation☆299Updated last year
- ☆214Updated 11 months ago
- Weaponized HellsGate/SigFlip☆198Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆135Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆363Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆314Updated 2 years ago