nettitude / RunOF
☆140Updated last year
Related projects: ⓘ
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆117Updated 2 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆111Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆87Updated 2 years ago
- A simple BOF that frees UDRLs☆106Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆134Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆134Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆73Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆93Updated last year
- ☆132Updated last year
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆94Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆83Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆57Updated 8 months ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆136Updated 6 months ago
- Implant drop-in for EDR testing☆126Updated 10 months ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆81Updated 2 years ago
- ☆87Updated this week
- Coerce Windows machines auth via MS-EVEN☆152Updated 8 months ago
- Collection of CobaltStrike beacon object files☆100Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆115Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- ☆135Updated 2 years ago
- ☆99Updated this week
- ☆100Updated this week
- ☆122Updated 9 months ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆160Updated last year
- ☆91Updated 2 years ago
- AV/EDR evasion via direct system calls.☆98Updated 9 months ago
- Exploring in-memory execution of .NET☆130Updated 2 years ago
- ☆61Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆169Updated 2 years ago